General
-
Target
c44730601e9b86798e2a4dad18e9a5226ba02139cd43aec531a1559a7398f909
-
Size
1.5MB
-
Sample
230504-qan2faec7s
-
MD5
d880f0476140a0087fda66436cbeb0c6
-
SHA1
e49aa7d51243b721587766ee6e6d8737c080784d
-
SHA256
c44730601e9b86798e2a4dad18e9a5226ba02139cd43aec531a1559a7398f909
-
SHA512
0a41eb67d00dddd8d0c62af82d62de18e4bcb201156154be2ac4077d3b8b75c6c99623f860c857bf83e1eccdad52039e1f94d7ff28e9d0e58b8e342e379e004c
-
SSDEEP
49152:71HNqvuuVML+bYP88SQ4xN4QSTxekLplSS6vt3C:d3uVw88g4QSTxekXSJvt3
Static task
static1
Behavioral task
behavioral1
Sample
c44730601e9b86798e2a4dad18e9a5226ba02139cd43aec531a1559a7398f909.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Targets
-
-
Target
c44730601e9b86798e2a4dad18e9a5226ba02139cd43aec531a1559a7398f909
-
Size
1.5MB
-
MD5
d880f0476140a0087fda66436cbeb0c6
-
SHA1
e49aa7d51243b721587766ee6e6d8737c080784d
-
SHA256
c44730601e9b86798e2a4dad18e9a5226ba02139cd43aec531a1559a7398f909
-
SHA512
0a41eb67d00dddd8d0c62af82d62de18e4bcb201156154be2ac4077d3b8b75c6c99623f860c857bf83e1eccdad52039e1f94d7ff28e9d0e58b8e342e379e004c
-
SSDEEP
49152:71HNqvuuVML+bYP88SQ4xN4QSTxekLplSS6vt3C:d3uVw88g4QSTxekXSJvt3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-