General
-
Target
98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa
-
Size
1.5MB
-
Sample
230504-ncwg7adg3x
-
MD5
205fa1ae96f04eb4a1c4b6cc8dcc6abb
-
SHA1
ecd47e50fdbf9c9cfb4b1215b2610c601e123e22
-
SHA256
98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa
-
SHA512
75b7842b40653dc36502fa071cfcc926e0335cad9bc3ad68bd88cb8fe0530130bdefe3c8b2087a9270b2fb68cbff4d06707862f62b27286228e49a4ce465ceca
-
SSDEEP
24576:Qy73Dt76Rj+YRS6uXIx0BUBTkOTmJre+C42hHGtEnwgyCYEy8ooHYxkUNAozWpps:XrDt/PIIKmJy+j2Xp3ZHYX6zG
Static task
static1
Behavioral task
behavioral1
Sample
98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Targets
-
-
Target
98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa
-
Size
1.5MB
-
MD5
205fa1ae96f04eb4a1c4b6cc8dcc6abb
-
SHA1
ecd47e50fdbf9c9cfb4b1215b2610c601e123e22
-
SHA256
98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa
-
SHA512
75b7842b40653dc36502fa071cfcc926e0335cad9bc3ad68bd88cb8fe0530130bdefe3c8b2087a9270b2fb68cbff4d06707862f62b27286228e49a4ce465ceca
-
SSDEEP
24576:Qy73Dt76Rj+YRS6uXIx0BUBTkOTmJre+C42hHGtEnwgyCYEy8ooHYxkUNAozWpps:XrDt/PIIKmJy+j2Xp3ZHYX6zG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-