General
-
Target
862f0b8d9d96627f67b57cb2b2a9385178da3b5fbc734c4cbf258c624130401f
-
Size
751KB
-
Sample
230601-jdlxxsdb42
-
MD5
68998758b45c2038d7f26f5768c7cb24
-
SHA1
b36524c8f421770fe8812e89d3eb1358766c8536
-
SHA256
862f0b8d9d96627f67b57cb2b2a9385178da3b5fbc734c4cbf258c624130401f
-
SHA512
ace4d177bc4f8052c7fb8225833d77a6480e0254b2e3d40cd1f5dea0ed218a6e42dd1c95bb9bd4c3fbc7dc510fce46e5940fc011656df0877db0bf5d68ff20fd
-
SSDEEP
12288:vMryy90e6lvz04JD+ZR5qjdJW4eJwt++juYzQ31WVcGhZer0MnG3y7/0T:Ryyvlx+X52teyt++TzQ31WFh00zT
Static task
static1
Behavioral task
behavioral1
Sample
862f0b8d9d96627f67b57cb2b2a9385178da3b5fbc734c4cbf258c624130401f.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
862f0b8d9d96627f67b57cb2b2a9385178da3b5fbc734c4cbf258c624130401f
-
Size
751KB
-
MD5
68998758b45c2038d7f26f5768c7cb24
-
SHA1
b36524c8f421770fe8812e89d3eb1358766c8536
-
SHA256
862f0b8d9d96627f67b57cb2b2a9385178da3b5fbc734c4cbf258c624130401f
-
SHA512
ace4d177bc4f8052c7fb8225833d77a6480e0254b2e3d40cd1f5dea0ed218a6e42dd1c95bb9bd4c3fbc7dc510fce46e5940fc011656df0877db0bf5d68ff20fd
-
SSDEEP
12288:vMryy90e6lvz04JD+ZR5qjdJW4eJwt++juYzQ31WVcGhZer0MnG3y7/0T:Ryyvlx+X52teyt++TzQ31WFh00zT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-