General
-
Target
3ea549bb9060ebd29bfab7d8588f31c1b8ec1291c4fbb33b7a8645b60d62e4be
-
Size
751KB
-
Sample
230601-geeh5acg68
-
MD5
94f91a81d1af151e6e046e6cea96438f
-
SHA1
7efa4374cfa9b2d1361717ad0e7a2fd1eef535eb
-
SHA256
3ea549bb9060ebd29bfab7d8588f31c1b8ec1291c4fbb33b7a8645b60d62e4be
-
SHA512
4b5ef52d2ef061092b39e56eb98a713665747c07727e5811cc64b9f572d346ec487714b90991f66b2f10dd6f722754f641248fc2c878ad6ac80520b78deffef3
-
SSDEEP
12288:MMrAy90uoUT2XUEB7SRRPvPatPuN+g4F2vq/DhqPses86k8c5ByKrsYnC/:cyAXUpPvPatK6px586k8WyKrtnC/
Static task
static1
Behavioral task
behavioral1
Sample
3ea549bb9060ebd29bfab7d8588f31c1b8ec1291c4fbb33b7a8645b60d62e4be.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.127:19045
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
3ea549bb9060ebd29bfab7d8588f31c1b8ec1291c4fbb33b7a8645b60d62e4be
-
Size
751KB
-
MD5
94f91a81d1af151e6e046e6cea96438f
-
SHA1
7efa4374cfa9b2d1361717ad0e7a2fd1eef535eb
-
SHA256
3ea549bb9060ebd29bfab7d8588f31c1b8ec1291c4fbb33b7a8645b60d62e4be
-
SHA512
4b5ef52d2ef061092b39e56eb98a713665747c07727e5811cc64b9f572d346ec487714b90991f66b2f10dd6f722754f641248fc2c878ad6ac80520b78deffef3
-
SSDEEP
12288:MMrAy90uoUT2XUEB7SRRPvPatPuN+g4F2vq/DhqPses86k8c5ByKrsYnC/:cyAXUpPvPatK6px586k8WyKrtnC/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-