General
-
Target
b7ea3cbb2b5cb73aee75dd1f7a6737106a3ccfa330261b23d44a39b40a4f4119
-
Size
479KB
-
Sample
230506-spahpsbh8z
-
MD5
9ef793c8a74b0804fb34d6f23ead6b29
-
SHA1
fde8dbc2f12921e057a5363c506b8043d34469c6
-
SHA256
b7ea3cbb2b5cb73aee75dd1f7a6737106a3ccfa330261b23d44a39b40a4f4119
-
SHA512
fdffa5311643e0e9ba4621dfa27b2df23a64d23597b6307d3c1fd823e2518ac5d20822295e681354eccfef2fcaa22200666201d226fbf990b80bc47282dbab21
-
SSDEEP
12288:vMrDy90Pid6HPw71rX9TiVLhMsP/hXmuxywrydI6:oyolI1rlub/UuQwrf6
Static task
static1
Behavioral task
behavioral1
Sample
b7ea3cbb2b5cb73aee75dd1f7a6737106a3ccfa330261b23d44a39b40a4f4119.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxud
217.196.96.101:4132
-
auth_value
f1403d964c52b6641ba1ef14803e6e74
Targets
-
-
Target
b7ea3cbb2b5cb73aee75dd1f7a6737106a3ccfa330261b23d44a39b40a4f4119
-
Size
479KB
-
MD5
9ef793c8a74b0804fb34d6f23ead6b29
-
SHA1
fde8dbc2f12921e057a5363c506b8043d34469c6
-
SHA256
b7ea3cbb2b5cb73aee75dd1f7a6737106a3ccfa330261b23d44a39b40a4f4119
-
SHA512
fdffa5311643e0e9ba4621dfa27b2df23a64d23597b6307d3c1fd823e2518ac5d20822295e681354eccfef2fcaa22200666201d226fbf990b80bc47282dbab21
-
SSDEEP
12288:vMrDy90Pid6HPw71rX9TiVLhMsP/hXmuxywrydI6:oyolI1rlub/UuQwrf6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-