General
-
Target
9e33b9594d659cf1f6e97ee8eb60a814dc4dfb9dcbf89c1ec6e808d7d6fd8917
-
Size
1020KB
-
Sample
230523-wky72shd21
-
MD5
71fd65dbba0527ed47c586687bd2a1a3
-
SHA1
d8aa0b24ec5f199e51f81a459174677de36bcfe5
-
SHA256
9e33b9594d659cf1f6e97ee8eb60a814dc4dfb9dcbf89c1ec6e808d7d6fd8917
-
SHA512
54002bcc3ba0ded27b0cbd38a3d75f5a09a5f0b80f044fbd1825094d6bd5c3ecc3b8a658517ec789a8634fe378d1f94fd903fcae7f69ca8ec2e07f9065fa1a5e
-
SSDEEP
24576:Iy53NQ/ty7BLOAivsnTCFw327whLYmvG/RQNIOc:PVCIpOaTI7wRYWG
Static task
static1
Behavioral task
behavioral1
Sample
9e33b9594d659cf1f6e97ee8eb60a814dc4dfb9dcbf89c1ec6e808d7d6fd8917.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
9e33b9594d659cf1f6e97ee8eb60a814dc4dfb9dcbf89c1ec6e808d7d6fd8917
-
Size
1020KB
-
MD5
71fd65dbba0527ed47c586687bd2a1a3
-
SHA1
d8aa0b24ec5f199e51f81a459174677de36bcfe5
-
SHA256
9e33b9594d659cf1f6e97ee8eb60a814dc4dfb9dcbf89c1ec6e808d7d6fd8917
-
SHA512
54002bcc3ba0ded27b0cbd38a3d75f5a09a5f0b80f044fbd1825094d6bd5c3ecc3b8a658517ec789a8634fe378d1f94fd903fcae7f69ca8ec2e07f9065fa1a5e
-
SSDEEP
24576:Iy53NQ/ty7BLOAivsnTCFw327whLYmvG/RQNIOc:PVCIpOaTI7wRYWG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-