General
-
Target
5fc12d1fc0cf062b4f6534834146b1770843273a997fefcebdb381219b206c1e
-
Size
1.0MB
-
Sample
230601-zs9kjaha2y
-
MD5
9acc61396897e446f50511db4b72d3f0
-
SHA1
4329ab0e783bdcdeb3f464b417b64ce094de0b5d
-
SHA256
5fc12d1fc0cf062b4f6534834146b1770843273a997fefcebdb381219b206c1e
-
SHA512
299a99c861b9c3459b92d26e9cec846c7e3e9c0eb6e1574aa03894f8d55b2635aab21489341bd24a408ff90993e9933acefe5e6b2767c639125b6b88a8c45590
-
SSDEEP
24576:+yD+Pj4NHgBwNplzJCAIBua2TCN/kavF8FFBuu4X:N6qHgB0plUlF6CxrviF
Static task
static1
Behavioral task
behavioral1
Sample
5fc12d1fc0cf062b4f6534834146b1770843273a997fefcebdb381219b206c1e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lars
83.97.73.127:19045
-
auth_value
8b06149cdaa5b5a4c6c7b3663f19e609
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
5fc12d1fc0cf062b4f6534834146b1770843273a997fefcebdb381219b206c1e
-
Size
1.0MB
-
MD5
9acc61396897e446f50511db4b72d3f0
-
SHA1
4329ab0e783bdcdeb3f464b417b64ce094de0b5d
-
SHA256
5fc12d1fc0cf062b4f6534834146b1770843273a997fefcebdb381219b206c1e
-
SHA512
299a99c861b9c3459b92d26e9cec846c7e3e9c0eb6e1574aa03894f8d55b2635aab21489341bd24a408ff90993e9933acefe5e6b2767c639125b6b88a8c45590
-
SSDEEP
24576:+yD+Pj4NHgBwNplzJCAIBua2TCN/kavF8FFBuu4X:N6qHgB0plUlF6CxrviF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-