General
-
Target
5ea6a844b38777d7279a9549c8b2f546a2ef9dde5479fcc0aa634c0f7214745a
-
Size
1.5MB
-
Sample
230504-p27gescd88
-
MD5
c052ee6e1c1371dca07e5ff7152ed337
-
SHA1
44f3048247403e26fb541f5e46da05728688b50f
-
SHA256
5ea6a844b38777d7279a9549c8b2f546a2ef9dde5479fcc0aa634c0f7214745a
-
SHA512
d6dab05fba4fe2dcc2a04dcc0d89fb5c11b1cc594e99b9f499feb341397328be660ff6a7fee41ac9025911529354418f309f22813baff618365d38d4fbb87802
-
SSDEEP
24576:tyM/CuB5TNpbViJIWSmpTbIOqhq2QVov2u6UW/8lhHsxtZ5/F08Yvsf0r7GGa:IMaSTbViJXG7QVov2u6U+8aTQ4
Static task
static1
Behavioral task
behavioral1
Sample
5ea6a844b38777d7279a9549c8b2f546a2ef9dde5479fcc0aa634c0f7214745a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Targets
-
-
Target
5ea6a844b38777d7279a9549c8b2f546a2ef9dde5479fcc0aa634c0f7214745a
-
Size
1.5MB
-
MD5
c052ee6e1c1371dca07e5ff7152ed337
-
SHA1
44f3048247403e26fb541f5e46da05728688b50f
-
SHA256
5ea6a844b38777d7279a9549c8b2f546a2ef9dde5479fcc0aa634c0f7214745a
-
SHA512
d6dab05fba4fe2dcc2a04dcc0d89fb5c11b1cc594e99b9f499feb341397328be660ff6a7fee41ac9025911529354418f309f22813baff618365d38d4fbb87802
-
SSDEEP
24576:tyM/CuB5TNpbViJIWSmpTbIOqhq2QVov2u6UW/8lhHsxtZ5/F08Yvsf0r7GGa:IMaSTbViJXG7QVov2u6U+8aTQ4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-