General
-
Target
ef5141474b21ef5be1ce725ee2dc8e8ee668475763ac76401d56bddf5d8820de
-
Size
754KB
-
Sample
230601-m91bzaed4v
-
MD5
b46bba5eaebea68bc8cc6954a6039a6c
-
SHA1
d1881c926e93b7e410ab1218b06953bb01b9dc55
-
SHA256
ef5141474b21ef5be1ce725ee2dc8e8ee668475763ac76401d56bddf5d8820de
-
SHA512
b2273defb4a3918c33f32e6037255333ed1dbc303f238a4d2fe33fdbc2cd47947906a39796baa31a9b1ab8c552ad7c14495d2049e19ba162ac1965f83975ce90
-
SSDEEP
12288:VMr2y90C4ujH4LZkBb9NWeflK6HKw35RB4e9GrhvKwOf4bee5Yxh2vDtlLshT7:fy5XEOZ9YgzB4IGlvKwOfQhPtl2v
Static task
static1
Behavioral task
behavioral1
Sample
ef5141474b21ef5be1ce725ee2dc8e8ee668475763ac76401d56bddf5d8820de.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
ef5141474b21ef5be1ce725ee2dc8e8ee668475763ac76401d56bddf5d8820de
-
Size
754KB
-
MD5
b46bba5eaebea68bc8cc6954a6039a6c
-
SHA1
d1881c926e93b7e410ab1218b06953bb01b9dc55
-
SHA256
ef5141474b21ef5be1ce725ee2dc8e8ee668475763ac76401d56bddf5d8820de
-
SHA512
b2273defb4a3918c33f32e6037255333ed1dbc303f238a4d2fe33fdbc2cd47947906a39796baa31a9b1ab8c552ad7c14495d2049e19ba162ac1965f83975ce90
-
SSDEEP
12288:VMr2y90C4ujH4LZkBb9NWeflK6HKw35RB4e9GrhvKwOf4bee5Yxh2vDtlLshT7:fy5XEOZ9YgzB4IGlvKwOfQhPtl2v
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-