General
-
Target
057e6d53fe16073df7a9dc17c92d73aa3c4971a3e06ae8a2df77b2a876105f27
-
Size
755KB
-
Sample
230602-bt2z3shc66
-
MD5
110899a71c64e7ff631a3c743f134ddc
-
SHA1
0a3b008970c0e2fbec885ff720b67e9ba0abf0c1
-
SHA256
057e6d53fe16073df7a9dc17c92d73aa3c4971a3e06ae8a2df77b2a876105f27
-
SHA512
56cd1bcf749e2fd78cf0e64582cfcac131d6d3ce1680fb828577114735bd527f26a1076ef982d81e7dc2e0813e838ef5ed7135f3150431150a1324a6ff55b616
-
SSDEEP
12288:RMr+y90AT0w7duYvVUvviyli/ulY7z5pfeptu03eOMuoVRKZfH4a:PyJpd7Uvxi/wY7zfej3OHuMQZfH4a
Static task
static1
Behavioral task
behavioral1
Sample
057e6d53fe16073df7a9dc17c92d73aa3c4971a3e06ae8a2df77b2a876105f27.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
057e6d53fe16073df7a9dc17c92d73aa3c4971a3e06ae8a2df77b2a876105f27
-
Size
755KB
-
MD5
110899a71c64e7ff631a3c743f134ddc
-
SHA1
0a3b008970c0e2fbec885ff720b67e9ba0abf0c1
-
SHA256
057e6d53fe16073df7a9dc17c92d73aa3c4971a3e06ae8a2df77b2a876105f27
-
SHA512
56cd1bcf749e2fd78cf0e64582cfcac131d6d3ce1680fb828577114735bd527f26a1076ef982d81e7dc2e0813e838ef5ed7135f3150431150a1324a6ff55b616
-
SSDEEP
12288:RMr+y90AT0w7duYvVUvviyli/ulY7z5pfeptu03eOMuoVRKZfH4a:PyJpd7Uvxi/wY7zfej3OHuMQZfH4a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-