General
-
Target
97cfbe44dbdc4bc06c3e7e61f0b651f1dbb175806b5d87ed6037be624b9f2128
-
Size
751KB
-
Sample
230601-a7dnzacc3x
-
MD5
e82b4ea5448bbdf1f368aa40e5c5a6b2
-
SHA1
f71fffba4533ead2d818c99864a27b39ef4d72f6
-
SHA256
97cfbe44dbdc4bc06c3e7e61f0b651f1dbb175806b5d87ed6037be624b9f2128
-
SHA512
d34a268afccad377fdc6def0a54478e54e1d91d05597082fd8836d0cd3c96e8acc4aacad3fe1f34e27a8f62c93fd05d287871719e2068b9adda7097ec9e0ce92
-
SSDEEP
12288:UMrxy902dYacexx5d9x37obAC8uFwz4N/RRx5Pf4AbNFLNbjMoVVO+TnO/mb+2:1yj7cex/d9BkHFs0Rx5PVbNj0oVo+KD2
Static task
static1
Behavioral task
behavioral1
Sample
97cfbe44dbdc4bc06c3e7e61f0b651f1dbb175806b5d87ed6037be624b9f2128.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
97cfbe44dbdc4bc06c3e7e61f0b651f1dbb175806b5d87ed6037be624b9f2128
-
Size
751KB
-
MD5
e82b4ea5448bbdf1f368aa40e5c5a6b2
-
SHA1
f71fffba4533ead2d818c99864a27b39ef4d72f6
-
SHA256
97cfbe44dbdc4bc06c3e7e61f0b651f1dbb175806b5d87ed6037be624b9f2128
-
SHA512
d34a268afccad377fdc6def0a54478e54e1d91d05597082fd8836d0cd3c96e8acc4aacad3fe1f34e27a8f62c93fd05d287871719e2068b9adda7097ec9e0ce92
-
SSDEEP
12288:UMrxy902dYacexx5d9x37obAC8uFwz4N/RRx5Pf4AbNFLNbjMoVVO+TnO/mb+2:1yj7cex/d9BkHFs0Rx5PVbNj0oVo+KD2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-