General
-
Target
2301a101d76ee2c1692ea788f4bee0d5904b1a869f4b28a9b4f53d9451991146
-
Size
1.0MB
-
Sample
230518-gcefcagh3x
-
MD5
3eb6dbdb1d6ae5316f8a2af149d9231a
-
SHA1
cafc1171d972f38bafa583fc3693461c4988de60
-
SHA256
2301a101d76ee2c1692ea788f4bee0d5904b1a869f4b28a9b4f53d9451991146
-
SHA512
7d6327ca3c8b664b6c82dfc8fafe66e83e1fc97637138763e5a63639155c0e7a677194951de1be3090c85806fe4fbec847cf98913ebd9ac61dec6ab4ea016582
-
SSDEEP
24576:EyKaNyPkOMC9h/2rlQERw7NuvnynkQs4mfTJ6S9:TK02kORd2OERw7NyvjDTIS
Static task
static1
Behavioral task
behavioral1
Sample
2301a101d76ee2c1692ea788f4bee0d5904b1a869f4b28a9b4f53d9451991146.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dream
77.91.68.253:4138
-
auth_value
7b4f26a4ca794e30cee1032d5cb62f5c
Targets
-
-
Target
2301a101d76ee2c1692ea788f4bee0d5904b1a869f4b28a9b4f53d9451991146
-
Size
1.0MB
-
MD5
3eb6dbdb1d6ae5316f8a2af149d9231a
-
SHA1
cafc1171d972f38bafa583fc3693461c4988de60
-
SHA256
2301a101d76ee2c1692ea788f4bee0d5904b1a869f4b28a9b4f53d9451991146
-
SHA512
7d6327ca3c8b664b6c82dfc8fafe66e83e1fc97637138763e5a63639155c0e7a677194951de1be3090c85806fe4fbec847cf98913ebd9ac61dec6ab4ea016582
-
SSDEEP
24576:EyKaNyPkOMC9h/2rlQERw7NuvnynkQs4mfTJ6S9:TK02kORd2OERw7NyvjDTIS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-