General
-
Target
adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da
-
Size
1.0MB
-
Sample
230518-ed8pgagf7y
-
MD5
b726c78d04687218945c68407d89cadd
-
SHA1
edd43e6ad3c923590d7302715b24c80f282cbd1a
-
SHA256
adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da
-
SHA512
9e570bef82a99a942981da40deea98b3851013ec48c866a3bceece103e91dae74727265d7e652bb6910fbe95dcee7032cbc4767f4ed108caa9874b1116beae25
-
SSDEEP
24576:EuyeAeDonj5lOViEgc0IR/1G+NCJgv9IcgD+9jbIaR:E9peDoj5IVGxmvmjD
Static task
static1
Behavioral task
behavioral1
Sample
adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dream
77.91.68.253:4138
-
auth_value
7b4f26a4ca794e30cee1032d5cb62f5c
Targets
-
-
Target
adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da
-
Size
1.0MB
-
MD5
b726c78d04687218945c68407d89cadd
-
SHA1
edd43e6ad3c923590d7302715b24c80f282cbd1a
-
SHA256
adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da
-
SHA512
9e570bef82a99a942981da40deea98b3851013ec48c866a3bceece103e91dae74727265d7e652bb6910fbe95dcee7032cbc4767f4ed108caa9874b1116beae25
-
SSDEEP
24576:EuyeAeDonj5lOViEgc0IR/1G+NCJgv9IcgD+9jbIaR:E9peDoj5IVGxmvmjD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-