General
-
Target
76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373
-
Size
1.0MB
-
Sample
230530-v4w2csbc7z
-
MD5
1592fbc7d9f8da8a1becb25328e941cc
-
SHA1
bf2408d2e338fc0b654d5963818f6988b1a3ba0f
-
SHA256
76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373
-
SHA512
64ad740de3c5942b5a8d22bce4327ae05862a171546c10f86ddabcc6e62d0bb6eb7d7a5c8753a9056648c81c598f1fb07c214c69b313cd0c360935b58e69e031
-
SSDEEP
24576:Zy/adxT9GbigTMbdvYmt3SmdmIE72sUg/w4wj2u8fQJm2Tdaw:MSd7GmthjcImICNUgQjt8fQX
Static task
static1
Behavioral task
behavioral1
Sample
76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
lusa
83.97.73.127:19045
-
auth_value
c9df946711e01c378b42221de692acbd
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373
-
Size
1.0MB
-
MD5
1592fbc7d9f8da8a1becb25328e941cc
-
SHA1
bf2408d2e338fc0b654d5963818f6988b1a3ba0f
-
SHA256
76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373
-
SHA512
64ad740de3c5942b5a8d22bce4327ae05862a171546c10f86ddabcc6e62d0bb6eb7d7a5c8753a9056648c81c598f1fb07c214c69b313cd0c360935b58e69e031
-
SSDEEP
24576:Zy/adxT9GbigTMbdvYmt3SmdmIE72sUg/w4wj2u8fQJm2Tdaw:MSd7GmthjcImICNUgQjt8fQX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-