General
-
Target
b51f66da49328af47f39e325ab20eb9ea476877e73c386b76fdcb5c239e51d5b
-
Size
1.0MB
-
Sample
230528-qpg7faff3w
-
MD5
aed1eaa915cf8cbc5fc53e16a2d396a7
-
SHA1
11ac5f2819a0d173718aa67c3640ea55173abc2c
-
SHA256
b51f66da49328af47f39e325ab20eb9ea476877e73c386b76fdcb5c239e51d5b
-
SHA512
3352ddeb18cb6a646beb54a5dc8afef72164f24538b8df3ec2c0d98efc7392d5b63d75a3f3d9df9cfd324870574d6e6d63de5b682857a2df7934e899fe26cd7e
-
SSDEEP
24576:7ytiTYOGlGiiVKZKMFVSEgD4RslRgB2qfi15zWqQKYBL:u0ToIbVVMjiE2ZzW2YB
Static task
static1
Malware Config
Extracted
redline
laswa
83.97.73.127:19062
-
auth_value
f93b7c6dad009734b220c3bf54087e12
Extracted
redline
mirko
83.97.73.127:19062
-
auth_value
35111a095377107ec8b7d3e035831af8
Extracted
redline
Redline
85.31.54.183:18435
-
auth_value
50837656cba6e4dd56bfbb4a61dadb63
Targets
-
-
Target
b51f66da49328af47f39e325ab20eb9ea476877e73c386b76fdcb5c239e51d5b
-
Size
1.0MB
-
MD5
aed1eaa915cf8cbc5fc53e16a2d396a7
-
SHA1
11ac5f2819a0d173718aa67c3640ea55173abc2c
-
SHA256
b51f66da49328af47f39e325ab20eb9ea476877e73c386b76fdcb5c239e51d5b
-
SHA512
3352ddeb18cb6a646beb54a5dc8afef72164f24538b8df3ec2c0d98efc7392d5b63d75a3f3d9df9cfd324870574d6e6d63de5b682857a2df7934e899fe26cd7e
-
SSDEEP
24576:7ytiTYOGlGiiVKZKMFVSEgD4RslRgB2qfi15zWqQKYBL:u0ToIbVVMjiE2ZzW2YB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-