General
-
Target
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7
-
Size
479KB
-
Sample
230504-aalnbahc29
-
MD5
52753d04454f5942c57a2f7eb3b079d3
-
SHA1
d4e0acd051b97ef4154afc0f5bab215d93bcc784
-
SHA256
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7
-
SHA512
76420e5ef5b9f4b5163fba193a8b6631d079cea2a4248374f57ba82b1bdd8a410c84afed991ec47ff6b5de8f1a160f9aeece416b29c9ec785de803e9eefad1ef
-
SSDEEP
6144:Kyy+bnr+ip0yN90QEJqoXr750UcFKDYjk95GtR53VMBSpeFQXxvCkvuqxF3n/:uMrGy90Lq475qFsYz9S2AQh6kWSX/
Static task
static1
Behavioral task
behavioral1
Sample
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Targets
-
-
Target
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7
-
Size
479KB
-
MD5
52753d04454f5942c57a2f7eb3b079d3
-
SHA1
d4e0acd051b97ef4154afc0f5bab215d93bcc784
-
SHA256
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7
-
SHA512
76420e5ef5b9f4b5163fba193a8b6631d079cea2a4248374f57ba82b1bdd8a410c84afed991ec47ff6b5de8f1a160f9aeece416b29c9ec785de803e9eefad1ef
-
SSDEEP
6144:Kyy+bnr+ip0yN90QEJqoXr750UcFKDYjk95GtR53VMBSpeFQXxvCkvuqxF3n/:uMrGy90Lq475qFsYz9S2AQh6kWSX/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-