General
-
Target
6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720
-
Size
1.1MB
-
Sample
230515-lmelbaff53
-
MD5
735b467f5dfb9ca634b8d743ea9597e9
-
SHA1
8f741b749e88f5cb53ad13db01e6d651595b69a0
-
SHA256
6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720
-
SHA512
a934528d59ec5ca7e1547fc6a1f4db40367b26cfabca0b72e303382baa1580704e0bc4e270be3c89cdfb3fe5e549abc8ffc89ad954e484712f5d382c4e78d31a
-
SSDEEP
24576:CyLdcSWbBf7bfLnL5mgSiisM0n5Ld6RqjEgoJC9Mww7s:pLK5HjL5mQN1RMwK
Static task
static1
Behavioral task
behavioral1
Sample
6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lays
185.161.248.75:4132
-
auth_value
239cb507c4bb32e630b1bee63365fe29
Extracted
redline
manka
185.161.248.75:4132
-
auth_value
d94715c55e1c02ef0aa67081d47a0c1f
Targets
-
-
Target
6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720
-
Size
1.1MB
-
MD5
735b467f5dfb9ca634b8d743ea9597e9
-
SHA1
8f741b749e88f5cb53ad13db01e6d651595b69a0
-
SHA256
6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720
-
SHA512
a934528d59ec5ca7e1547fc6a1f4db40367b26cfabca0b72e303382baa1580704e0bc4e270be3c89cdfb3fe5e549abc8ffc89ad954e484712f5d382c4e78d31a
-
SSDEEP
24576:CyLdcSWbBf7bfLnL5mgSiisM0n5Ld6RqjEgoJC9Mww7s:pLK5HjL5mQN1RMwK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-