General
-
Target
3bdb4d34a0c5e458ec6f0b5034ebc0ca17608e5a9be35072f9332a93ec36b81e
-
Size
755KB
-
Sample
230602-a326rshb39
-
MD5
433dbdbb189461d262a6c259df0541cd
-
SHA1
81d93d218f482a3a1f566b1e6194fffe183fca7c
-
SHA256
3bdb4d34a0c5e458ec6f0b5034ebc0ca17608e5a9be35072f9332a93ec36b81e
-
SHA512
a0475c1bdb9dab80f51969d6c72119e7b40e1a8f2816935ea67268e554eca87d1ab1e783df708dfeb17e04bb952721fb8cf6fbca043085c295a9802bc2a31012
-
SSDEEP
12288:2Mr8y90jvUenfXh46jK3vsz/TtfCtRll60YZorG7OB/XqGM/RKMzjAcDZrykW3kB:uyqhhM3vsvt61goXXLMZKMogZOkWUB
Static task
static1
Behavioral task
behavioral1
Sample
3bdb4d34a0c5e458ec6f0b5034ebc0ca17608e5a9be35072f9332a93ec36b81e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dars
83.97.73.127:19045
-
auth_value
7cd208e6b6c927262304d5d4d88647fd
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
3bdb4d34a0c5e458ec6f0b5034ebc0ca17608e5a9be35072f9332a93ec36b81e
-
Size
755KB
-
MD5
433dbdbb189461d262a6c259df0541cd
-
SHA1
81d93d218f482a3a1f566b1e6194fffe183fca7c
-
SHA256
3bdb4d34a0c5e458ec6f0b5034ebc0ca17608e5a9be35072f9332a93ec36b81e
-
SHA512
a0475c1bdb9dab80f51969d6c72119e7b40e1a8f2816935ea67268e554eca87d1ab1e783df708dfeb17e04bb952721fb8cf6fbca043085c295a9802bc2a31012
-
SSDEEP
12288:2Mr8y90jvUenfXh46jK3vsz/TtfCtRll60YZorG7OB/XqGM/RKMzjAcDZrykW3kB:uyqhhM3vsvt61goXXLMZKMogZOkWUB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-