General
-
Target
301d3f1540c4fdecf9ceac3aa9f0a64dc97a719f28640c5f448f2fb5d96d30c4
-
Size
1.0MB
-
Sample
230602-cyabashh51
-
MD5
c57de868a0ba791c3bbb229661bb274e
-
SHA1
03a7c1616bc23d3cb56aedcec1681b6175d7f19a
-
SHA256
301d3f1540c4fdecf9ceac3aa9f0a64dc97a719f28640c5f448f2fb5d96d30c4
-
SHA512
29aaa0bd10d5703b119c91febfa9049b0058899a461f9e22e039bf2a2360b2397439489d089e7d3247fc6fd0b7511cbe17d01b6d516de9d31ab4943d9ba5ac05
-
SSDEEP
24576:Ayk6lajgzYhmJVIg5DMmU4wbbKKjKQi270n:HLlz7j5I3+Q4
Static task
static1
Behavioral task
behavioral1
Sample
301d3f1540c4fdecf9ceac3aa9f0a64dc97a719f28640c5f448f2fb5d96d30c4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lars
83.97.73.127:19045
-
auth_value
8b06149cdaa5b5a4c6c7b3663f19e609
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
301d3f1540c4fdecf9ceac3aa9f0a64dc97a719f28640c5f448f2fb5d96d30c4
-
Size
1.0MB
-
MD5
c57de868a0ba791c3bbb229661bb274e
-
SHA1
03a7c1616bc23d3cb56aedcec1681b6175d7f19a
-
SHA256
301d3f1540c4fdecf9ceac3aa9f0a64dc97a719f28640c5f448f2fb5d96d30c4
-
SHA512
29aaa0bd10d5703b119c91febfa9049b0058899a461f9e22e039bf2a2360b2397439489d089e7d3247fc6fd0b7511cbe17d01b6d516de9d31ab4943d9ba5ac05
-
SSDEEP
24576:Ayk6lajgzYhmJVIg5DMmU4wbbKKjKQi270n:HLlz7j5I3+Q4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-