General
-
Target
7f39d4afc291e600aebdbc98bec2a04222bc606f72a721fdb4424ea9f0503bd8
-
Size
751KB
-
Sample
230601-mdg6hseb7y
-
MD5
74007f4a1699cb66c1d22b44cb77f231
-
SHA1
b3b0e3a364c197275d619c0eb214a94a60382527
-
SHA256
7f39d4afc291e600aebdbc98bec2a04222bc606f72a721fdb4424ea9f0503bd8
-
SHA512
3fee10221044a5761d0f8759b24c8de6b0b67630f60464cca8b44b80e637705e983d86df44ecb4d3bc59adb68213ac9f1602fc60e40df55b2d674d7eefadc0e3
-
SSDEEP
12288:rMrLy90MtyEav0EOj9dqc6vuRiLQ2igAChWTNmXbEBMyvuwY84WZu:oyJvy0V/Hwu6wOWTNmXbs1vVR/u
Static task
static1
Behavioral task
behavioral1
Sample
7f39d4afc291e600aebdbc98bec2a04222bc606f72a721fdb4424ea9f0503bd8.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
7f39d4afc291e600aebdbc98bec2a04222bc606f72a721fdb4424ea9f0503bd8
-
Size
751KB
-
MD5
74007f4a1699cb66c1d22b44cb77f231
-
SHA1
b3b0e3a364c197275d619c0eb214a94a60382527
-
SHA256
7f39d4afc291e600aebdbc98bec2a04222bc606f72a721fdb4424ea9f0503bd8
-
SHA512
3fee10221044a5761d0f8759b24c8de6b0b67630f60464cca8b44b80e637705e983d86df44ecb4d3bc59adb68213ac9f1602fc60e40df55b2d674d7eefadc0e3
-
SSDEEP
12288:rMrLy90MtyEav0EOj9dqc6vuRiLQ2igAChWTNmXbEBMyvuwY84WZu:oyJvy0V/Hwu6wOWTNmXbs1vVR/u
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-