General
-
Target
1215363ab33e4388037979cc4d051ce5.exe
-
Size
602KB
-
Sample
230504-lnrl9sbd34
-
MD5
1215363ab33e4388037979cc4d051ce5
-
SHA1
a96597ad5156e6c92d7e9098bfc7e279e612b366
-
SHA256
6755c42c0b84482aed1334a662b8f834e16272a7330c5910b0f22c1d56828568
-
SHA512
94ec377836b9435a2940c27d04ee426c8b575e5d260780e9fb434ed1b416a5ad0839d85ba7f0a47faad99b9615cf372e3d3775da47be48c873f996d829b8bdc3
-
SSDEEP
12288:NMr6y90ublr+lkJfRLPQxgetlcrwbGVGWxF2L:DylKRFtDGVGf
Static task
static1
Behavioral task
behavioral1
Sample
1215363ab33e4388037979cc4d051ce5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1215363ab33e4388037979cc4d051ce5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Targets
-
-
Target
1215363ab33e4388037979cc4d051ce5.exe
-
Size
602KB
-
MD5
1215363ab33e4388037979cc4d051ce5
-
SHA1
a96597ad5156e6c92d7e9098bfc7e279e612b366
-
SHA256
6755c42c0b84482aed1334a662b8f834e16272a7330c5910b0f22c1d56828568
-
SHA512
94ec377836b9435a2940c27d04ee426c8b575e5d260780e9fb434ed1b416a5ad0839d85ba7f0a47faad99b9615cf372e3d3775da47be48c873f996d829b8bdc3
-
SSDEEP
12288:NMr6y90ublr+lkJfRLPQxgetlcrwbGVGWxF2L:DylKRFtDGVGf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-