General
-
Target
aa886ce1791f32538e4990cfdd6f279db9f37a52d8fb8ab7de77478717682097
-
Size
755KB
-
Sample
230602-g16jqsab86
-
MD5
1384b6070811afee2b2aafb66452dd78
-
SHA1
4242595a35f0409738d79966daa470fe03350f6f
-
SHA256
aa886ce1791f32538e4990cfdd6f279db9f37a52d8fb8ab7de77478717682097
-
SHA512
20ac0af170f0095a43fc611e989e6e9af2ea77ac3d9072a035a31470a1a8da0f1b8a3c14e2041ed564e66cd0ece785c6b3ed21309bcb4fc9b52579c1b4c9238c
-
SSDEEP
12288:jMrYy90HQ36mvxd9timAqGj+w1YyvE//u5/bsTT0q6xpWFZvS5d26k152a+pDoAC:7yWQ3xJAzjruyvuuBsEqYAF5mXk15B+q
Static task
static1
Behavioral task
behavioral1
Sample
aa886ce1791f32538e4990cfdd6f279db9f37a52d8fb8ab7de77478717682097.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dars
83.97.73.127:19045
-
auth_value
7cd208e6b6c927262304d5d4d88647fd
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
aa886ce1791f32538e4990cfdd6f279db9f37a52d8fb8ab7de77478717682097
-
Size
755KB
-
MD5
1384b6070811afee2b2aafb66452dd78
-
SHA1
4242595a35f0409738d79966daa470fe03350f6f
-
SHA256
aa886ce1791f32538e4990cfdd6f279db9f37a52d8fb8ab7de77478717682097
-
SHA512
20ac0af170f0095a43fc611e989e6e9af2ea77ac3d9072a035a31470a1a8da0f1b8a3c14e2041ed564e66cd0ece785c6b3ed21309bcb4fc9b52579c1b4c9238c
-
SSDEEP
12288:jMrYy90HQ36mvxd9timAqGj+w1YyvE//u5/bsTT0q6xpWFZvS5d26k152a+pDoAC:7yWQ3xJAzjruyvuuBsEqYAF5mXk15B+q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-