General
-
Target
655abdb5eda82b034dbfd902891f12b9dff3b0a7e69cb9183568e8ebb52a3449
-
Size
793KB
-
Sample
230602-3qavzafd2t
-
MD5
8b4fd4ec10cd74aa4b2e4e57da1d72b0
-
SHA1
2d5f44e57ead90c8d1312a487b52def5d94f5ea5
-
SHA256
655abdb5eda82b034dbfd902891f12b9dff3b0a7e69cb9183568e8ebb52a3449
-
SHA512
5d50ab8cafab2df10a0fa2f611efe6fd89c181b6fe1d37bd7c6915ac61d4e9de419c9e32059292ffbcff53eed3dca6f32c8c05b2f8c781009738a954796a9552
-
SSDEEP
24576:Oy4wSbBIKQnGVHEpRTrwCPoA1lkgW3CHbL:dd6AZjT1U3C7
Static task
static1
Behavioral task
behavioral1
Sample
655abdb5eda82b034dbfd902891f12b9dff3b0a7e69cb9183568e8ebb52a3449.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
655abdb5eda82b034dbfd902891f12b9dff3b0a7e69cb9183568e8ebb52a3449
-
Size
793KB
-
MD5
8b4fd4ec10cd74aa4b2e4e57da1d72b0
-
SHA1
2d5f44e57ead90c8d1312a487b52def5d94f5ea5
-
SHA256
655abdb5eda82b034dbfd902891f12b9dff3b0a7e69cb9183568e8ebb52a3449
-
SHA512
5d50ab8cafab2df10a0fa2f611efe6fd89c181b6fe1d37bd7c6915ac61d4e9de419c9e32059292ffbcff53eed3dca6f32c8c05b2f8c781009738a954796a9552
-
SSDEEP
24576:Oy4wSbBIKQnGVHEpRTrwCPoA1lkgW3CHbL:dd6AZjT1U3C7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-