General
-
Target
cc8adef6a2eb850ee5ead87968ef201c773dd67e90885d8f03668848ec8e846d
-
Size
731KB
-
Sample
230531-kpfqqadg98
-
MD5
45a25f58056bbb85a9d1d19fc9ece639
-
SHA1
3812de1fd2f408f49f832658240bccd934afdb8f
-
SHA256
cc8adef6a2eb850ee5ead87968ef201c773dd67e90885d8f03668848ec8e846d
-
SHA512
38cb259cf37679cdb249b8c0844576098fc33aae9d9d21ef396bf5937141b42048a50f0a8b223c2b5bcc2120410f6527ae57eb10a15ecb4a2716da0e7a5548d5
-
SSDEEP
12288:kMrPy90Le5MFPWCEwy/iUGEojirAr/TFM3ZZEt34coCU3M/Dsm:by1wZEti8oEA7BM3ZZy3N5U8/Im
Static task
static1
Behavioral task
behavioral1
Sample
cc8adef6a2eb850ee5ead87968ef201c773dd67e90885d8f03668848ec8e846d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
tinda
83.97.73.127:19045
-
auth_value
88da3924455f4ba3a1b76cd03af918bb
Targets
-
-
Target
cc8adef6a2eb850ee5ead87968ef201c773dd67e90885d8f03668848ec8e846d
-
Size
731KB
-
MD5
45a25f58056bbb85a9d1d19fc9ece639
-
SHA1
3812de1fd2f408f49f832658240bccd934afdb8f
-
SHA256
cc8adef6a2eb850ee5ead87968ef201c773dd67e90885d8f03668848ec8e846d
-
SHA512
38cb259cf37679cdb249b8c0844576098fc33aae9d9d21ef396bf5937141b42048a50f0a8b223c2b5bcc2120410f6527ae57eb10a15ecb4a2716da0e7a5548d5
-
SSDEEP
12288:kMrPy90Le5MFPWCEwy/iUGEojirAr/TFM3ZZEt34coCU3M/Dsm:by1wZEti8oEA7BM3ZZy3N5U8/Im
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-