General
-
Target
d733e4931cfde378ea735d11d291529c1c60c2f45ff3625b1a43b0307773959a
-
Size
756KB
-
Sample
230602-a5n2xshe5s
-
MD5
8c9f5dd1e122a3b9df797923c89956bf
-
SHA1
29c2ab1f81bd1cd87057746b1c5dee1d3896d5a2
-
SHA256
d733e4931cfde378ea735d11d291529c1c60c2f45ff3625b1a43b0307773959a
-
SHA512
64a78c08bdeacdadde45394183f967fe3fe21de3ea66d80dda68cd4ab21f68198e0105ff317269479e194d272553e1f2773aad30fcdec3e45916f324a8d23a7f
-
SSDEEP
12288:oMrty90WQ/sSsDnAk3P8MEwLoNVx4YH0S01gTVWCr+Hl3kRyR:lydEZOX/8NwL4VRN6yr+HlkIR
Static task
static1
Behavioral task
behavioral1
Sample
d733e4931cfde378ea735d11d291529c1c60c2f45ff3625b1a43b0307773959a.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dars
83.97.73.127:19045
-
auth_value
7cd208e6b6c927262304d5d4d88647fd
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
d733e4931cfde378ea735d11d291529c1c60c2f45ff3625b1a43b0307773959a
-
Size
756KB
-
MD5
8c9f5dd1e122a3b9df797923c89956bf
-
SHA1
29c2ab1f81bd1cd87057746b1c5dee1d3896d5a2
-
SHA256
d733e4931cfde378ea735d11d291529c1c60c2f45ff3625b1a43b0307773959a
-
SHA512
64a78c08bdeacdadde45394183f967fe3fe21de3ea66d80dda68cd4ab21f68198e0105ff317269479e194d272553e1f2773aad30fcdec3e45916f324a8d23a7f
-
SSDEEP
12288:oMrty90WQ/sSsDnAk3P8MEwLoNVx4YH0S01gTVWCr+Hl3kRyR:lydEZOX/8NwL4VRN6yr+HlkIR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-