General
-
Target
d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e
-
Size
1.0MB
-
Sample
230518-n4kj1ahf3x
-
MD5
885cb2ef3d53a62546a6619665807ea8
-
SHA1
a4cdc49349de36e40c1f17f1ee862941fe4dbff6
-
SHA256
d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e
-
SHA512
2052a059ae3f879a3a57efd551e37d4af01209a66b17437105708a662dfda06c861099d9bdca38c409897a6564d327bb992efcfe5e8330b0cdf6d24511e2cd72
-
SSDEEP
24576:oy8QaV3QzUOSAGnEFSmFXINKfExOdukIF6NdG5T3ASTXZD:v80/NnIiFEQ3y6N8l3Z
Static task
static1
Behavioral task
behavioral1
Sample
d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
luna
77.91.68.253:4138
-
auth_value
16dec8addb01db1c11c59667022ef7a2
Targets
-
-
Target
d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e
-
Size
1.0MB
-
MD5
885cb2ef3d53a62546a6619665807ea8
-
SHA1
a4cdc49349de36e40c1f17f1ee862941fe4dbff6
-
SHA256
d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e
-
SHA512
2052a059ae3f879a3a57efd551e37d4af01209a66b17437105708a662dfda06c861099d9bdca38c409897a6564d327bb992efcfe5e8330b0cdf6d24511e2cd72
-
SSDEEP
24576:oy8QaV3QzUOSAGnEFSmFXINKfExOdukIF6NdG5T3ASTXZD:v80/NnIiFEQ3y6N8l3Z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-