General
-
Target
69a98a6a7f121c708a51d7b5108e360f2dd80c0d5c9ed95315867875ea6379a1
-
Size
1.0MB
-
Sample
230602-1j6yqaee72
-
MD5
5ff8b2ec43a08d04d6951df8de755c58
-
SHA1
c438ccc9b92779a28d0f1282ec8e56d37cdf64b7
-
SHA256
69a98a6a7f121c708a51d7b5108e360f2dd80c0d5c9ed95315867875ea6379a1
-
SHA512
74566a138e47bdfb18071df36789747614e729ec7362c1517a6cbd5116ddd77c6b883bca3d48d7b1f76ea96aa5ce013fd23f90cd0ff34901e57f1239c19efac2
-
SSDEEP
24576:KyyFJXXsrN9Y3b9KHFU4aoQG/MRe0MC5BcOhT5p:RyFFs83b9KHu4a8UhMszB
Static task
static1
Behavioral task
behavioral1
Sample
69a98a6a7f121c708a51d7b5108e360f2dd80c0d5c9ed95315867875ea6379a1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.126:19046
-
auth_value
6a764aa41830c77712442516d143bc9c
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
69a98a6a7f121c708a51d7b5108e360f2dd80c0d5c9ed95315867875ea6379a1
-
Size
1.0MB
-
MD5
5ff8b2ec43a08d04d6951df8de755c58
-
SHA1
c438ccc9b92779a28d0f1282ec8e56d37cdf64b7
-
SHA256
69a98a6a7f121c708a51d7b5108e360f2dd80c0d5c9ed95315867875ea6379a1
-
SHA512
74566a138e47bdfb18071df36789747614e729ec7362c1517a6cbd5116ddd77c6b883bca3d48d7b1f76ea96aa5ce013fd23f90cd0ff34901e57f1239c19efac2
-
SSDEEP
24576:KyyFJXXsrN9Y3b9KHFU4aoQG/MRe0MC5BcOhT5p:RyFFs83b9KHu4a8UhMszB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-