General
-
Target
0d914597bc92eaf81fbc3641005c6e1b485ce55dac14433907b5f2e5bd4d09e7
-
Size
752KB
-
Sample
230602-bk6xnshc37
-
MD5
596d9525aad51408090ba567f801c6c1
-
SHA1
517ef198ff931373682dc6842aba4b7bd501e0a8
-
SHA256
0d914597bc92eaf81fbc3641005c6e1b485ce55dac14433907b5f2e5bd4d09e7
-
SHA512
3cf3d3986b287830dfd7bf6176a80e3024065b12bec529a0ba9e5056ff89e86104ad2a51a683dcfec055077ca8cd1ac2dd5ec0a63b63e910f0feeb68c39dea5f
-
SSDEEP
12288:EMrOy90tgTy/y6m57NIvoA061ltsiE7Tnpd5L8omQCqV24xgmSEJNM5JFn0:SyS66m5GAjpiEfpd5LXmQlRlNMN0
Static task
static1
Behavioral task
behavioral1
Sample
0d914597bc92eaf81fbc3641005c6e1b485ce55dac14433907b5f2e5bd4d09e7.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
0d914597bc92eaf81fbc3641005c6e1b485ce55dac14433907b5f2e5bd4d09e7
-
Size
752KB
-
MD5
596d9525aad51408090ba567f801c6c1
-
SHA1
517ef198ff931373682dc6842aba4b7bd501e0a8
-
SHA256
0d914597bc92eaf81fbc3641005c6e1b485ce55dac14433907b5f2e5bd4d09e7
-
SHA512
3cf3d3986b287830dfd7bf6176a80e3024065b12bec529a0ba9e5056ff89e86104ad2a51a683dcfec055077ca8cd1ac2dd5ec0a63b63e910f0feeb68c39dea5f
-
SSDEEP
12288:EMrOy90tgTy/y6m57NIvoA061ltsiE7Tnpd5L8omQCqV24xgmSEJNM5JFn0:SyS66m5GAjpiEfpd5LXmQlRlNMN0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-