General
-
Target
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe
-
Size
774KB
-
Sample
230503-vwzghsfe98
-
MD5
85ee14a1ce8affbcaff2e82a6774a25a
-
SHA1
23bee76adcdf317310416845044c2da54909cf31
-
SHA256
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39e917e1f2bb93063b7e0
-
SHA512
19e550aeb6669103f543b9822647ea136b802a3aa872357009bb968c163c170432bcc1c50118ccaddd619236fba07a722434492f041186daea2c6432d226afe4
-
SSDEEP
12288:+Mrby90eC20WEIpWZobIJ5KuhFLSS3ECEAhnuLzuM5zd7VtiZm:1y2IpWBJ5KuPb0CuzJ5Vd
Static task
static1
Behavioral task
behavioral1
Sample
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
217.196.96.56:4138
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Targets
-
-
Target
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39.exe
-
Size
774KB
-
MD5
85ee14a1ce8affbcaff2e82a6774a25a
-
SHA1
23bee76adcdf317310416845044c2da54909cf31
-
SHA256
141d2394effa1553b9a0fe07b200174e2ecc2f0eb2f39e917e1f2bb93063b7e0
-
SHA512
19e550aeb6669103f543b9822647ea136b802a3aa872357009bb968c163c170432bcc1c50118ccaddd619236fba07a722434492f041186daea2c6432d226afe4
-
SSDEEP
12288:+Mrby90eC20WEIpWZobIJ5KuhFLSS3ECEAhnuLzuM5zd7VtiZm:1y2IpWBJ5KuPb0CuzJ5Vd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-