General
-
Target
a7a39f62f6788008f683b6e5fbaa26c60d38ba9091c199ed957793e531f38547
-
Size
479KB
-
Sample
230506-yqs94aae23
-
MD5
8f6c90d70b20b42733cd60dffca9d0a2
-
SHA1
71d1631bba8089ad09981c113d660c8917baab74
-
SHA256
a7a39f62f6788008f683b6e5fbaa26c60d38ba9091c199ed957793e531f38547
-
SHA512
a28f379c52fdb61e13fd4bf7f1b95f382a99bd1712a568e015eed695ffde682b79ba36cd6793e169d8c972bf8f0b65ad1e8c2b88b91174d7891ce867ee2ab44c
-
SSDEEP
12288:rMroy906ZRpLB07/r//TUEMsLeKJfj9RZxS3GB:byPI/r/gEReKJRN
Static task
static1
Behavioral task
behavioral1
Sample
a7a39f62f6788008f683b6e5fbaa26c60d38ba9091c199ed957793e531f38547.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Targets
-
-
Target
a7a39f62f6788008f683b6e5fbaa26c60d38ba9091c199ed957793e531f38547
-
Size
479KB
-
MD5
8f6c90d70b20b42733cd60dffca9d0a2
-
SHA1
71d1631bba8089ad09981c113d660c8917baab74
-
SHA256
a7a39f62f6788008f683b6e5fbaa26c60d38ba9091c199ed957793e531f38547
-
SHA512
a28f379c52fdb61e13fd4bf7f1b95f382a99bd1712a568e015eed695ffde682b79ba36cd6793e169d8c972bf8f0b65ad1e8c2b88b91174d7891ce867ee2ab44c
-
SSDEEP
12288:rMroy906ZRpLB07/r//TUEMsLeKJfj9RZxS3GB:byPI/r/gEReKJRN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-