General
-
Target
185fd95bacf2d16181117ce925764a622b6e262a3d5786cb72b96feb401cd8f0
-
Size
1.0MB
-
Sample
230601-z4kesagf27
-
MD5
46fe17ef3dca9c4fa7c87e2d4259c116
-
SHA1
7c8664921223d39fe4b748586e9a37a52a9254d9
-
SHA256
185fd95bacf2d16181117ce925764a622b6e262a3d5786cb72b96feb401cd8f0
-
SHA512
1afb3b8d6c519c08267596bff2a15d8e69b1e51cc6f0b851ff4163da5f5576ab0eead785dd9d6a1bd14acf2e761d74b7367d8c55390f50e79dfbfc08c7f2e3a5
-
SSDEEP
24576:vy52mL0M5O8oSkZgMxKjh2lAmPcJQnZcx6OiXiZ:6Ym4M1oIMsjhYkmZcx6ny
Static task
static1
Behavioral task
behavioral1
Sample
185fd95bacf2d16181117ce925764a622b6e262a3d5786cb72b96feb401cd8f0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lars
83.97.73.127:19045
-
auth_value
8b06149cdaa5b5a4c6c7b3663f19e609
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
185fd95bacf2d16181117ce925764a622b6e262a3d5786cb72b96feb401cd8f0
-
Size
1.0MB
-
MD5
46fe17ef3dca9c4fa7c87e2d4259c116
-
SHA1
7c8664921223d39fe4b748586e9a37a52a9254d9
-
SHA256
185fd95bacf2d16181117ce925764a622b6e262a3d5786cb72b96feb401cd8f0
-
SHA512
1afb3b8d6c519c08267596bff2a15d8e69b1e51cc6f0b851ff4163da5f5576ab0eead785dd9d6a1bd14acf2e761d74b7367d8c55390f50e79dfbfc08c7f2e3a5
-
SSDEEP
24576:vy52mL0M5O8oSkZgMxKjh2lAmPcJQnZcx6OiXiZ:6Ym4M1oIMsjhYkmZcx6ny
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-