General
-
Target
0c415baaa0d5cc882ae5b1d513af2c1953cc0fd1d07ad47067495abc486bd808
-
Size
754KB
-
Sample
230601-q4ygzaee66
-
MD5
1b8dbf7c7f17a716d3c6c478643eeb61
-
SHA1
f01100f8907e2ec0491f1aa61ac1de66b7187541
-
SHA256
0c415baaa0d5cc882ae5b1d513af2c1953cc0fd1d07ad47067495abc486bd808
-
SHA512
10419eade841eaf74bfdf024ef0a354e0452973bf23e7d11181968018676dc04e9ad432e879c8d88a51cba9ddd0ec3b3dfae1fccfccff0796c4a070a21c58069
-
SSDEEP
12288:KMrFy90r8zhQ0gPB0lL9aG0o4HE6kjaO2iLySWvtRNLk1p2oBfb7mwmU+x:ry5hQMAzFO2ieSm+1gOnX+x
Static task
static1
Behavioral task
behavioral1
Sample
0c415baaa0d5cc882ae5b1d513af2c1953cc0fd1d07ad47067495abc486bd808.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.127:19045
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
0c415baaa0d5cc882ae5b1d513af2c1953cc0fd1d07ad47067495abc486bd808
-
Size
754KB
-
MD5
1b8dbf7c7f17a716d3c6c478643eeb61
-
SHA1
f01100f8907e2ec0491f1aa61ac1de66b7187541
-
SHA256
0c415baaa0d5cc882ae5b1d513af2c1953cc0fd1d07ad47067495abc486bd808
-
SHA512
10419eade841eaf74bfdf024ef0a354e0452973bf23e7d11181968018676dc04e9ad432e879c8d88a51cba9ddd0ec3b3dfae1fccfccff0796c4a070a21c58069
-
SSDEEP
12288:KMrFy90r8zhQ0gPB0lL9aG0o4HE6kjaO2iLySWvtRNLk1p2oBfb7mwmU+x:ry5hQMAzFO2ieSm+1gOnX+x
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-