General
-
Target
dbd57a6e5f82b3bdae08208036d41acb75cfb3d06c70f5dafe22e8c7a5c0599d
-
Size
1004KB
-
Sample
230531-c5rtxsce66
-
MD5
4ec4d02ae0507ef734115c75577eb0da
-
SHA1
8b12cd6f32c03315ffddcd4853721d6229d4179e
-
SHA256
dbd57a6e5f82b3bdae08208036d41acb75cfb3d06c70f5dafe22e8c7a5c0599d
-
SHA512
3f1bd8602ec8763c411f2e9b2b7603e3936dba41fb643b79527655c7d61e6ee0591fb5b3be47d52f40563a23a31a70d3215dbf384e3c7c94edb0bb8fa70e545d
-
SSDEEP
24576:nyVBQBHDwGFcx0rBoBA+D/dB3w0ov1lZPOYsln:yYexqBtsbv
Static task
static1
Behavioral task
behavioral1
Sample
dbd57a6e5f82b3bdae08208036d41acb75cfb3d06c70f5dafe22e8c7a5c0599d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lusa
83.97.73.127:19045
-
auth_value
c9df946711e01c378b42221de692acbd
Extracted
redline
tinda
83.97.73.127:19045
-
auth_value
88da3924455f4ba3a1b76cd03af918bb
Targets
-
-
Target
dbd57a6e5f82b3bdae08208036d41acb75cfb3d06c70f5dafe22e8c7a5c0599d
-
Size
1004KB
-
MD5
4ec4d02ae0507ef734115c75577eb0da
-
SHA1
8b12cd6f32c03315ffddcd4853721d6229d4179e
-
SHA256
dbd57a6e5f82b3bdae08208036d41acb75cfb3d06c70f5dafe22e8c7a5c0599d
-
SHA512
3f1bd8602ec8763c411f2e9b2b7603e3936dba41fb643b79527655c7d61e6ee0591fb5b3be47d52f40563a23a31a70d3215dbf384e3c7c94edb0bb8fa70e545d
-
SSDEEP
24576:nyVBQBHDwGFcx0rBoBA+D/dB3w0ov1lZPOYsln:yYexqBtsbv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-