General
-
Target
265c7da46b9a8cd3f85d19bf6c057928c559a13098bc0f851c68f8067e5db7e7
-
Size
708KB
-
Sample
230504-lf6q8abc87
-
MD5
35e34a3f39cda3ab95e4b5d768fcdc89
-
SHA1
6f6508dce9b073654d135e6718be3755c4eb2c26
-
SHA256
265c7da46b9a8cd3f85d19bf6c057928c559a13098bc0f851c68f8067e5db7e7
-
SHA512
05b9a7d9c025264fb31b716a7f86e80a7d1dbcb246ff46c7795a30ac55cd254ca5425e3175a2e9f8ac468a7d69a489cd26153456a2bfd8162305fe96e187b83e
-
SSDEEP
12288:+Mrfy90Zd7/EZibUuiaOhAzhAp93UD/H0GTxYIoenMn9+CbYL0pXsUEcxS:pym7G4SaeAzhgJUIjCM9+iYQFsd
Static task
static1
Behavioral task
behavioral1
Sample
265c7da46b9a8cd3f85d19bf6c057928c559a13098bc0f851c68f8067e5db7e7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Targets
-
-
Target
265c7da46b9a8cd3f85d19bf6c057928c559a13098bc0f851c68f8067e5db7e7
-
Size
708KB
-
MD5
35e34a3f39cda3ab95e4b5d768fcdc89
-
SHA1
6f6508dce9b073654d135e6718be3755c4eb2c26
-
SHA256
265c7da46b9a8cd3f85d19bf6c057928c559a13098bc0f851c68f8067e5db7e7
-
SHA512
05b9a7d9c025264fb31b716a7f86e80a7d1dbcb246ff46c7795a30ac55cd254ca5425e3175a2e9f8ac468a7d69a489cd26153456a2bfd8162305fe96e187b83e
-
SSDEEP
12288:+Mrfy90Zd7/EZibUuiaOhAzhAp93UD/H0GTxYIoenMn9+CbYL0pXsUEcxS:pym7G4SaeAzhgJUIjCM9+iYQFsd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-