General
-
Target
f2bcad407f4d652df12518ee5dd0a1598dc5d32fd4312183730134ea74d74953
-
Size
478KB
-
Sample
230506-rqmnzshe69
-
MD5
cd5e6d2a14536f64fb783b37c1d05875
-
SHA1
b2f31ccae181cb7419098ef5cff18cdb1d6f07cd
-
SHA256
f2bcad407f4d652df12518ee5dd0a1598dc5d32fd4312183730134ea74d74953
-
SHA512
47bb9f06a2be550bc5f78583a5998f0522d125924def01d18d8f702668b7533f2b3475d1bc332b57ef22a13453b031c012e73e7e08438a2861baf163fd588999
-
SSDEEP
12288:BMr/y90EJHGZFVPznr5c1u31+TpEU2GdQL9kwaIHv:iyFE3z1XgTM9dv
Static task
static1
Behavioral task
behavioral1
Sample
f2bcad407f4d652df12518ee5dd0a1598dc5d32fd4312183730134ea74d74953.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Targets
-
-
Target
f2bcad407f4d652df12518ee5dd0a1598dc5d32fd4312183730134ea74d74953
-
Size
478KB
-
MD5
cd5e6d2a14536f64fb783b37c1d05875
-
SHA1
b2f31ccae181cb7419098ef5cff18cdb1d6f07cd
-
SHA256
f2bcad407f4d652df12518ee5dd0a1598dc5d32fd4312183730134ea74d74953
-
SHA512
47bb9f06a2be550bc5f78583a5998f0522d125924def01d18d8f702668b7533f2b3475d1bc332b57ef22a13453b031c012e73e7e08438a2861baf163fd588999
-
SSDEEP
12288:BMr/y90EJHGZFVPznr5c1u31+TpEU2GdQL9kwaIHv:iyFE3z1XgTM9dv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-