General
-
Target
0b3a8f57bea6defe90ec59084170da628ccf4270b018cede9858afbf4fb7c9ba
-
Size
754KB
-
Sample
230602-c41qfahe75
-
MD5
2f4527f3c08402d8926825ef4e1ad991
-
SHA1
3e418f06175db69fbc9561a12510bc176613cb26
-
SHA256
0b3a8f57bea6defe90ec59084170da628ccf4270b018cede9858afbf4fb7c9ba
-
SHA512
a152dab35ae8dae4ba4403753af36d4b2e79a45813e1f5604e024139564f79e258e66e697fa0cefe8ae7db25f2d7e820ece4035f5f8f6d61a1e7e3539a46abbb
-
SSDEEP
12288:2Mr/y90henEezX1CArXc9MKTQpC6XiQmqwS7MMXbSU1/RMz1RjSsE0xL+RItPrnh:xyQenEe71dXtk1GNmqnMCbSdvSsEB2ph
Static task
static1
Behavioral task
behavioral1
Sample
0b3a8f57bea6defe90ec59084170da628ccf4270b018cede9858afbf4fb7c9ba.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dars
83.97.73.127:19045
-
auth_value
7cd208e6b6c927262304d5d4d88647fd
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
0b3a8f57bea6defe90ec59084170da628ccf4270b018cede9858afbf4fb7c9ba
-
Size
754KB
-
MD5
2f4527f3c08402d8926825ef4e1ad991
-
SHA1
3e418f06175db69fbc9561a12510bc176613cb26
-
SHA256
0b3a8f57bea6defe90ec59084170da628ccf4270b018cede9858afbf4fb7c9ba
-
SHA512
a152dab35ae8dae4ba4403753af36d4b2e79a45813e1f5604e024139564f79e258e66e697fa0cefe8ae7db25f2d7e820ece4035f5f8f6d61a1e7e3539a46abbb
-
SSDEEP
12288:2Mr/y90henEezX1CArXc9MKTQpC6XiQmqwS7MMXbSU1/RMz1RjSsE0xL+RItPrnh:xyQenEe71dXtk1GNmqnMCbSdvSsEB2ph
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-