General
-
Target
1b92d1d27be26128b8680082270af9f1b5ca21d91dc4ad4508dbf632f3a9436f
-
Size
731KB
-
Sample
230531-azx3mscf2t
-
MD5
db1fb900c9b2bbbe9032428431ae4498
-
SHA1
f204d3f2c6ce65f76452408d69a52acb8a1bae52
-
SHA256
1b92d1d27be26128b8680082270af9f1b5ca21d91dc4ad4508dbf632f3a9436f
-
SHA512
136b1aa77f71ae2d22599b8060331d2fe7fec4bdfb8c3d411a8dab70d980269a9e3de3e155de0ea38f68d5070bd8cbe9e30b2eb25e9a4a996106e06aeb2b0bb7
-
SSDEEP
12288:cMrey90TOrqh2v6vUcSZiiN8Rc0iHBiJW1SPwwXCvf0BkfXJuYf/pS9QC1I/:SypQ2Dc88uhiJSXw4sBkxg1w
Static task
static1
Behavioral task
behavioral1
Sample
1b92d1d27be26128b8680082270af9f1b5ca21d91dc4ad4508dbf632f3a9436f.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
tinda
83.97.73.127:19045
-
auth_value
88da3924455f4ba3a1b76cd03af918bb
Targets
-
-
Target
1b92d1d27be26128b8680082270af9f1b5ca21d91dc4ad4508dbf632f3a9436f
-
Size
731KB
-
MD5
db1fb900c9b2bbbe9032428431ae4498
-
SHA1
f204d3f2c6ce65f76452408d69a52acb8a1bae52
-
SHA256
1b92d1d27be26128b8680082270af9f1b5ca21d91dc4ad4508dbf632f3a9436f
-
SHA512
136b1aa77f71ae2d22599b8060331d2fe7fec4bdfb8c3d411a8dab70d980269a9e3de3e155de0ea38f68d5070bd8cbe9e30b2eb25e9a4a996106e06aeb2b0bb7
-
SSDEEP
12288:cMrey90TOrqh2v6vUcSZiiN8Rc0iHBiJW1SPwwXCvf0BkfXJuYf/pS9QC1I/:SypQ2Dc88uhiJSXw4sBkxg1w
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-