General
-
Target
829b8266f1b2577ed29f7c5ae830a07ee7fc448908f672559066874d54d60049
-
Size
755KB
-
Sample
230602-gtp86sae81
-
MD5
880eb7750d0bc6826bdcd2b575bd4077
-
SHA1
c83f41c10b300e90553302eadcd3ba19884a61a4
-
SHA256
829b8266f1b2577ed29f7c5ae830a07ee7fc448908f672559066874d54d60049
-
SHA512
1b73050528f94937f4631092841081ef8ddd7b12f25bb46b141d164ca0d28c7b9a4406e92f29b907d7e848d23e62449df2da97174060e2857bce0b3e0c498303
-
SSDEEP
12288:3Mrky90o79NtIgN9745duR5PKYBv1k/L75V5ikSfoZdxL2uqLFkSXBmRhSnxhkRQ:bylS5dbYBoLNVc2d92uq+OBwfRtlAf
Static task
static1
Behavioral task
behavioral1
Sample
829b8266f1b2577ed29f7c5ae830a07ee7fc448908f672559066874d54d60049.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
829b8266f1b2577ed29f7c5ae830a07ee7fc448908f672559066874d54d60049
-
Size
755KB
-
MD5
880eb7750d0bc6826bdcd2b575bd4077
-
SHA1
c83f41c10b300e90553302eadcd3ba19884a61a4
-
SHA256
829b8266f1b2577ed29f7c5ae830a07ee7fc448908f672559066874d54d60049
-
SHA512
1b73050528f94937f4631092841081ef8ddd7b12f25bb46b141d164ca0d28c7b9a4406e92f29b907d7e848d23e62449df2da97174060e2857bce0b3e0c498303
-
SSDEEP
12288:3Mrky90o79NtIgN9745duR5PKYBv1k/L75V5ikSfoZdxL2uqLFkSXBmRhSnxhkRQ:bylS5dbYBoLNVc2d92uq+OBwfRtlAf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-