General
-
Target
fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2
-
Size
753KB
-
Sample
230602-d3lqkaaa9y
-
MD5
801e8f62d2a792d4252380c997e90e83
-
SHA1
90a329f273960392c920223422331496c68737f0
-
SHA256
fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2
-
SHA512
704700aec753d0e8e3579df75ed2910260d21d7b1e5860f74609c87c106f0948e04f3aa981b8b8f5dd892b0dcc3bf9d74e13671cebaf7bb96abe8d3fbf3a3c93
-
SSDEEP
12288:YMrAy90Bjx7hgA5iWsSW+q6nM3kpJN/ldA1U5zRSwfsa12xDsZ5JTd9xl2e:YyCdgU+t3kRDaUvoDK94e
Static task
static1
Behavioral task
behavioral1
Sample
fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2
-
Size
753KB
-
MD5
801e8f62d2a792d4252380c997e90e83
-
SHA1
90a329f273960392c920223422331496c68737f0
-
SHA256
fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2
-
SHA512
704700aec753d0e8e3579df75ed2910260d21d7b1e5860f74609c87c106f0948e04f3aa981b8b8f5dd892b0dcc3bf9d74e13671cebaf7bb96abe8d3fbf3a3c93
-
SSDEEP
12288:YMrAy90Bjx7hgA5iWsSW+q6nM3kpJN/ldA1U5zRSwfsa12xDsZ5JTd9xl2e:YyCdgU+t3kRDaUvoDK94e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-