General
-
Target
e0dbe49b05381fb7b3e14c8d6bacc991a9610242127ce573cb29e500ebaaa2d0
-
Size
751KB
-
Sample
230601-d6t64sch2s
-
MD5
6edf0de31acfeedd7ebe1eea9262ce5b
-
SHA1
4b7df8828115856a0dca5d053f5ec4889e5a5448
-
SHA256
e0dbe49b05381fb7b3e14c8d6bacc991a9610242127ce573cb29e500ebaaa2d0
-
SHA512
eac065ba5ebc4a69d83edf3420696a187c005879e02b8e80b30a7ca0c716f6da3c93b4c662c93bc27b313252384b94908b97e459b7fc448f6c9e2e230e4cd567
-
SSDEEP
12288:tMruy90xwEJ+ltSjB6FjVbdUrC9YQq5P/7jIIvQWdAtTTnyO3wVtuPTP1U2:3yk9jBKjVberebq5LjHGtvnywwVkq2
Static task
static1
Behavioral task
behavioral1
Sample
e0dbe49b05381fb7b3e14c8d6bacc991a9610242127ce573cb29e500ebaaa2d0.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
e0dbe49b05381fb7b3e14c8d6bacc991a9610242127ce573cb29e500ebaaa2d0
-
Size
751KB
-
MD5
6edf0de31acfeedd7ebe1eea9262ce5b
-
SHA1
4b7df8828115856a0dca5d053f5ec4889e5a5448
-
SHA256
e0dbe49b05381fb7b3e14c8d6bacc991a9610242127ce573cb29e500ebaaa2d0
-
SHA512
eac065ba5ebc4a69d83edf3420696a187c005879e02b8e80b30a7ca0c716f6da3c93b4c662c93bc27b313252384b94908b97e459b7fc448f6c9e2e230e4cd567
-
SSDEEP
12288:tMruy90xwEJ+ltSjB6FjVbdUrC9YQq5P/7jIIvQWdAtTTnyO3wVtuPTP1U2:3yk9jBKjVberebq5LjHGtvnywwVkq2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-