General
-
Target
7f365d5243ffd0a8b6b29ecedd1ebf6c3f92665fd4e8b079880536c0436a0700
-
Size
755KB
-
Sample
230601-rmxpsafa6v
-
MD5
12437050adbb81458a5d2c68999baaa3
-
SHA1
36891843c9ae6ffef5bf17a086793d792f9213a4
-
SHA256
7f365d5243ffd0a8b6b29ecedd1ebf6c3f92665fd4e8b079880536c0436a0700
-
SHA512
71bce83f339340b913f5dbd999f114c93e6ce4d94726cc599443eb5c42955c78f7a03f2c119dbe92d3768a2d3b685dd8c4df3db62259f250b5a94b4f57a22208
-
SSDEEP
12288:wMrby90dw2ZSsBqrNnFettGeJdlN4SjYW604JsCVeI81A7uNV1IE2GtnY3IKvMry:7yqw2ZhJ3lnjP/4JsueZK7u7UgkvMry
Static task
static1
Behavioral task
behavioral1
Sample
7f365d5243ffd0a8b6b29ecedd1ebf6c3f92665fd4e8b079880536c0436a0700.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
rocker
83.97.73.127:19045
-
auth_value
b4693c25843b5a1c7d63376e73e32dae
Targets
-
-
Target
7f365d5243ffd0a8b6b29ecedd1ebf6c3f92665fd4e8b079880536c0436a0700
-
Size
755KB
-
MD5
12437050adbb81458a5d2c68999baaa3
-
SHA1
36891843c9ae6ffef5bf17a086793d792f9213a4
-
SHA256
7f365d5243ffd0a8b6b29ecedd1ebf6c3f92665fd4e8b079880536c0436a0700
-
SHA512
71bce83f339340b913f5dbd999f114c93e6ce4d94726cc599443eb5c42955c78f7a03f2c119dbe92d3768a2d3b685dd8c4df3db62259f250b5a94b4f57a22208
-
SSDEEP
12288:wMrby90dw2ZSsBqrNnFettGeJdlN4SjYW604JsCVeI81A7uNV1IE2GtnY3IKvMry:7yqw2ZhJ3lnjP/4JsueZK7u7UgkvMry
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-