General
-
Target
9beab7f0b7ada8ab2d4d7bb3e555fa3d97408fcf74c711ee455b93903de40466
-
Size
479KB
-
Sample
230506-t9fqwsaa34
-
MD5
5e263e3fe20246d11caf77eb25e87ef0
-
SHA1
0dd40445f6d115a6e73fa7271b49e1b92e2de478
-
SHA256
9beab7f0b7ada8ab2d4d7bb3e555fa3d97408fcf74c711ee455b93903de40466
-
SHA512
21f121837696aea5ebbfae338b36390e65fc0585c0a28f088318fda5a305e6463e84fd0a748ea4aa6bcef849a1e32621ed09dca5c5577da6c0d91a15c07c0ca4
-
SSDEEP
12288:iMrey90YVEZsuYfelQtqczX2RK3/tQNaXS:4yviZIrqDRKv0X
Static task
static1
Behavioral task
behavioral1
Sample
9beab7f0b7ada8ab2d4d7bb3e555fa3d97408fcf74c711ee455b93903de40466.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Targets
-
-
Target
9beab7f0b7ada8ab2d4d7bb3e555fa3d97408fcf74c711ee455b93903de40466
-
Size
479KB
-
MD5
5e263e3fe20246d11caf77eb25e87ef0
-
SHA1
0dd40445f6d115a6e73fa7271b49e1b92e2de478
-
SHA256
9beab7f0b7ada8ab2d4d7bb3e555fa3d97408fcf74c711ee455b93903de40466
-
SHA512
21f121837696aea5ebbfae338b36390e65fc0585c0a28f088318fda5a305e6463e84fd0a748ea4aa6bcef849a1e32621ed09dca5c5577da6c0d91a15c07c0ca4
-
SSDEEP
12288:iMrey90YVEZsuYfelQtqczX2RK3/tQNaXS:4yviZIrqDRKv0X
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-