General
-
Target
a9ad29b00dfda07553cfa52cb4df1b07.exe
-
Size
792KB
-
Sample
230602-19mmrsef43
-
MD5
a9ad29b00dfda07553cfa52cb4df1b07
-
SHA1
52e48c3a9d77bb63b020563a7794d11248a3d3cf
-
SHA256
435258b05e020aff3ecdd7d57d7e4e2698725b71e18c378a6e2cb5681950e710
-
SHA512
70e5cca5b3cf7b3ffef39046a57b5550840fa0a05cc5ea59abf219f8b7878a83e0a4a885c531a580a3acc1ade01c5e937709839152b169e94f97cce3c35056da
-
SSDEEP
12288:dMrVy90Bo00vfAHadDw1iRlheZfhQlh6wEfKQ3g5G5i1RWzDMNOp:Yypv46ds12lYZfhOY3t8RW7p
Static task
static1
Behavioral task
behavioral1
Sample
a9ad29b00dfda07553cfa52cb4df1b07.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a9ad29b00dfda07553cfa52cb4df1b07.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
a9ad29b00dfda07553cfa52cb4df1b07.exe
-
Size
792KB
-
MD5
a9ad29b00dfda07553cfa52cb4df1b07
-
SHA1
52e48c3a9d77bb63b020563a7794d11248a3d3cf
-
SHA256
435258b05e020aff3ecdd7d57d7e4e2698725b71e18c378a6e2cb5681950e710
-
SHA512
70e5cca5b3cf7b3ffef39046a57b5550840fa0a05cc5ea59abf219f8b7878a83e0a4a885c531a580a3acc1ade01c5e937709839152b169e94f97cce3c35056da
-
SSDEEP
12288:dMrVy90Bo00vfAHadDw1iRlheZfhQlh6wEfKQ3g5G5i1RWzDMNOp:Yypv46ds12lYZfhOY3t8RW7p
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-