General
-
Target
5f89b7f4b0f2d44bef99c491e504a40fee0dc0cec9b35824d4b58eee790958d1
-
Size
752KB
-
Sample
230601-cjl2jsca72
-
MD5
18112338a802bb93bb9a8637e54eeeb6
-
SHA1
a5a91a7e82ca3bde37daec6a5bf9f35e100ea877
-
SHA256
5f89b7f4b0f2d44bef99c491e504a40fee0dc0cec9b35824d4b58eee790958d1
-
SHA512
b7cae41b19fef8bfdd84d5c55132b36d5f94cdd9a2774d2643064f8d13a76dfb7634b51e61536b102b9a388691502bd8ed95cf2d072accff08817ac377bad63d
-
SSDEEP
12288:mMrCy90oY/G821hFHc0JJ0nMl11ZpRVieJXL2BX1ngUsTVuS3piUY+1eILJYktxj:Qy3KrsjHRJJ0oHzb0X1nPGj3piUYfIL3
Static task
static1
Behavioral task
behavioral1
Sample
5f89b7f4b0f2d44bef99c491e504a40fee0dc0cec9b35824d4b58eee790958d1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.127:19045
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
5f89b7f4b0f2d44bef99c491e504a40fee0dc0cec9b35824d4b58eee790958d1
-
Size
752KB
-
MD5
18112338a802bb93bb9a8637e54eeeb6
-
SHA1
a5a91a7e82ca3bde37daec6a5bf9f35e100ea877
-
SHA256
5f89b7f4b0f2d44bef99c491e504a40fee0dc0cec9b35824d4b58eee790958d1
-
SHA512
b7cae41b19fef8bfdd84d5c55132b36d5f94cdd9a2774d2643064f8d13a76dfb7634b51e61536b102b9a388691502bd8ed95cf2d072accff08817ac377bad63d
-
SSDEEP
12288:mMrCy90oY/G821hFHc0JJ0nMl11ZpRVieJXL2BX1ngUsTVuS3piUY+1eILJYktxj:Qy3KrsjHRJJ0oHzb0X1nPGj3piUYfIL3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-