General
-
Target
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5
-
Size
567KB
-
Sample
230503-w9srkaga23
-
MD5
551aabc308baa115813abbb911ab1401
-
SHA1
4f50c46190948b290c7f463d03bde9c323ce7949
-
SHA256
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5
-
SHA512
59a9c3359e32b32991261d2521cd48906770c041ca4008ace91c126cecd6054e69c0ba716299b297dc84598aa0d1341a8a5104a98d43e177d928a3b25fd9c483
-
SSDEEP
12288:JMrFy90k+ajqIEkd4PUAwJUhyMfzM9LaLVioMj8hmaHZJ:syHrEKuUwXSaLEJj8ooJ
Static task
static1
Behavioral task
behavioral1
Sample
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Targets
-
-
Target
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5
-
Size
567KB
-
MD5
551aabc308baa115813abbb911ab1401
-
SHA1
4f50c46190948b290c7f463d03bde9c323ce7949
-
SHA256
d38246eb3fe3ce38c75c7b6f916bee7dde3482c03a9abddb17e7bded3d42e1e5
-
SHA512
59a9c3359e32b32991261d2521cd48906770c041ca4008ace91c126cecd6054e69c0ba716299b297dc84598aa0d1341a8a5104a98d43e177d928a3b25fd9c483
-
SSDEEP
12288:JMrFy90k+ajqIEkd4PUAwJUhyMfzM9LaLVioMj8hmaHZJ:syHrEKuUwXSaLEJj8ooJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-