General
-
Target
6088542d0df559e08786c8420804e935dceaa9db753bb9989f0b55e5c5fe7ddc
-
Size
756KB
-
Sample
230602-ewpdjshg53
-
MD5
b54018d8b03490bd2a06ddec75bf2d61
-
SHA1
924ea3d3ce21faf6c718702c35b9e4d9436052d5
-
SHA256
6088542d0df559e08786c8420804e935dceaa9db753bb9989f0b55e5c5fe7ddc
-
SHA512
889d2e6995f345fbbf278d5ab89d67381d1af4e49a0ed11d6e5155de07a14a1827eeaaf15e8147c204145c0f3d6fa9440db0628881a016752ab0cd76b3574435
-
SSDEEP
12288:WMrLy90yNTIT3eoWQj+TOkfHsNYhhbZSS0e59JLOL0CwQY8/VZRnroCbP7ATrRtj:1yNroWQKbfsNQhos9JLO+89ZaCGf39
Static task
static1
Behavioral task
behavioral1
Sample
6088542d0df559e08786c8420804e935dceaa9db753bb9989f0b55e5c5fe7ddc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
6088542d0df559e08786c8420804e935dceaa9db753bb9989f0b55e5c5fe7ddc
-
Size
756KB
-
MD5
b54018d8b03490bd2a06ddec75bf2d61
-
SHA1
924ea3d3ce21faf6c718702c35b9e4d9436052d5
-
SHA256
6088542d0df559e08786c8420804e935dceaa9db753bb9989f0b55e5c5fe7ddc
-
SHA512
889d2e6995f345fbbf278d5ab89d67381d1af4e49a0ed11d6e5155de07a14a1827eeaaf15e8147c204145c0f3d6fa9440db0628881a016752ab0cd76b3574435
-
SSDEEP
12288:WMrLy90yNTIT3eoWQj+TOkfHsNYhhbZSS0e59JLOL0CwQY8/VZRnroCbP7ATrRtj:1yNroWQKbfsNQhos9JLO+89ZaCGf39
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-