General
-
Target
6e25adeb0530f42692511c73461746804a925bc7d8ff43af6981ebe606237d05
-
Size
1.0MB
-
Sample
230518-agmtysgg55
-
MD5
4607dd5d8bff39a1b427c6e65e79f1ec
-
SHA1
2f30cd979d927130fec6481e0c7cbf0392ef5c7b
-
SHA256
6e25adeb0530f42692511c73461746804a925bc7d8ff43af6981ebe606237d05
-
SHA512
6de8d742343d83557bbb12693b1b7c0ba544079f6f58f3584358906e274e00d251d00c79c56f7110686c7eeeb9c6137f4660df74dca6d8210ec9aca036970de6
-
SSDEEP
24576:LycPh9N2z1I9JmRdIZG9cftGZIInCVfs7AOa7ylau4xN:+cPXNUd94a/ra7JN
Static task
static1
Behavioral task
behavioral1
Sample
6e25adeb0530f42692511c73461746804a925bc7d8ff43af6981ebe606237d05.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
luna
77.91.68.253:4138
-
auth_value
16dec8addb01db1c11c59667022ef7a2
Targets
-
-
Target
6e25adeb0530f42692511c73461746804a925bc7d8ff43af6981ebe606237d05
-
Size
1.0MB
-
MD5
4607dd5d8bff39a1b427c6e65e79f1ec
-
SHA1
2f30cd979d927130fec6481e0c7cbf0392ef5c7b
-
SHA256
6e25adeb0530f42692511c73461746804a925bc7d8ff43af6981ebe606237d05
-
SHA512
6de8d742343d83557bbb12693b1b7c0ba544079f6f58f3584358906e274e00d251d00c79c56f7110686c7eeeb9c6137f4660df74dca6d8210ec9aca036970de6
-
SSDEEP
24576:LycPh9N2z1I9JmRdIZG9cftGZIInCVfs7AOa7ylau4xN:+cPXNUd94a/ra7JN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-