General
-
Target
d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3
-
Size
753KB
-
Sample
230602-amka1shd9t
-
MD5
9dee4b6818c91c7345ec4115d10d78cd
-
SHA1
c2efa40cbdd0faacab8d39d83841e626f8190df1
-
SHA256
d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3
-
SHA512
f4cde1c872fdc3218364dbbdc7dc95180a29bf43e21c92e9f93face87e90853cdc4381904cbd41ae65af02586e5b1669f52d4348e5b4c8bbb63c975d6af5f149
-
SSDEEP
12288:EMr1y90mDBy7MuaF/UoL8hR4S/On9XtE2soN2MBEgBJnsdrvskrhw5ygEL:JyTVy5aBxARr/y9dE2fNdBtQ9w5ypL
Static task
static1
Behavioral task
behavioral1
Sample
d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3
-
Size
753KB
-
MD5
9dee4b6818c91c7345ec4115d10d78cd
-
SHA1
c2efa40cbdd0faacab8d39d83841e626f8190df1
-
SHA256
d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3
-
SHA512
f4cde1c872fdc3218364dbbdc7dc95180a29bf43e21c92e9f93face87e90853cdc4381904cbd41ae65af02586e5b1669f52d4348e5b4c8bbb63c975d6af5f149
-
SSDEEP
12288:EMr1y90mDBy7MuaF/UoL8hR4S/On9XtE2soN2MBEgBJnsdrvskrhw5ygEL:JyTVy5aBxARr/y9dE2fNdBtQ9w5ypL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-