General
-
Target
51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0
-
Size
1.5MB
-
Sample
230504-mbeydadd51
-
MD5
02f2a17d81a97c1fdea0975934ba1369
-
SHA1
31dc67e98a48eb0fbea106ca5183f0bc0701a7a6
-
SHA256
51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0
-
SHA512
091eab54961e3c138d089bdf6729ec8ca7a7f11cb1c9d369ea3b962c5f8045c60fb917cb0c5925a8fe5973cc7a9bf4a4c603926baff0fc5b4b7020c0b5ec3e2b
-
SSDEEP
49152:NvaHmUEWPY27qtvS+QDi/f+8THj7mD7q:dJUEWx7qtvSZWLnmD7q
Static task
static1
Behavioral task
behavioral1
Sample
51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Targets
-
-
Target
51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0
-
Size
1.5MB
-
MD5
02f2a17d81a97c1fdea0975934ba1369
-
SHA1
31dc67e98a48eb0fbea106ca5183f0bc0701a7a6
-
SHA256
51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0
-
SHA512
091eab54961e3c138d089bdf6729ec8ca7a7f11cb1c9d369ea3b962c5f8045c60fb917cb0c5925a8fe5973cc7a9bf4a4c603926baff0fc5b4b7020c0b5ec3e2b
-
SSDEEP
49152:NvaHmUEWPY27qtvS+QDi/f+8THj7mD7q:dJUEWx7qtvSZWLnmD7q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-