General
-
Target
3f0fe1260453a9ed6f15e6b025a3555fd00ae2749e9f10645cd9a1c3127abfc2
-
Size
731KB
-
Sample
230531-q1bh2afg4w
-
MD5
ac318715b1249ad451cf28cbb3f0291a
-
SHA1
5c75a91f47fcb31882523f352fc0482ef87f9494
-
SHA256
3f0fe1260453a9ed6f15e6b025a3555fd00ae2749e9f10645cd9a1c3127abfc2
-
SHA512
962505e1b868ed6bfa891fa438a847a7a63117f30448e1c59a763a29868d14d8b02c55da0f4e67800ccf19e71475cfff8283acc290d446e906ce13f0d46aeccf
-
SSDEEP
12288:7MrVy90WjGfJe5qezGvwHBorDPSVsFVZZAMfPp+OLhvFvHxynhM8g/VhJL8LVP:ayjjUJe5qRvwhorDPSVsX7PZvFvxEMhY
Static task
static1
Behavioral task
behavioral1
Sample
3f0fe1260453a9ed6f15e6b025a3555fd00ae2749e9f10645cd9a1c3127abfc2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
nitro
83.97.73.127:19045
-
auth_value
1b68cf84b9b046f28b71cb39e44aa0e4
Targets
-
-
Target
3f0fe1260453a9ed6f15e6b025a3555fd00ae2749e9f10645cd9a1c3127abfc2
-
Size
731KB
-
MD5
ac318715b1249ad451cf28cbb3f0291a
-
SHA1
5c75a91f47fcb31882523f352fc0482ef87f9494
-
SHA256
3f0fe1260453a9ed6f15e6b025a3555fd00ae2749e9f10645cd9a1c3127abfc2
-
SHA512
962505e1b868ed6bfa891fa438a847a7a63117f30448e1c59a763a29868d14d8b02c55da0f4e67800ccf19e71475cfff8283acc290d446e906ce13f0d46aeccf
-
SSDEEP
12288:7MrVy90WjGfJe5qezGvwHBorDPSVsFVZZAMfPp+OLhvFvHxynhM8g/VhJL8LVP:ayjjUJe5qRvwhorDPSVsX7PZvFvxEMhY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-