General
-
Target
9a31ca957d38054a9f63030afa540d363ef6ce9ce77f43e31571fa34498447fc
-
Size
753KB
-
Sample
230602-hdyfaaaf7t
-
MD5
3b0c727cc16fa9aeef41de406c1dcec0
-
SHA1
2b48851926beb6f0adcc72327eea157e8847df40
-
SHA256
9a31ca957d38054a9f63030afa540d363ef6ce9ce77f43e31571fa34498447fc
-
SHA512
3ec975808b2242d2dee4276507202e60190b139b44ae0837af5d3c27564456725382a0c2ae2d82c8b7fefbb71f0e2a9bc166684de475a95c6004ca91eae633f6
-
SSDEEP
12288:0MrIy90LBhXeI8FT0qiDKa97hSRK5TS553BLTRDE2zx81IY9LjaQhkQHJlKSW+Vx:kyAjn8JhJa9ERKU5FBhD7yiYxjnh/odW
Static task
static1
Behavioral task
behavioral1
Sample
9a31ca957d38054a9f63030afa540d363ef6ce9ce77f43e31571fa34498447fc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
9a31ca957d38054a9f63030afa540d363ef6ce9ce77f43e31571fa34498447fc
-
Size
753KB
-
MD5
3b0c727cc16fa9aeef41de406c1dcec0
-
SHA1
2b48851926beb6f0adcc72327eea157e8847df40
-
SHA256
9a31ca957d38054a9f63030afa540d363ef6ce9ce77f43e31571fa34498447fc
-
SHA512
3ec975808b2242d2dee4276507202e60190b139b44ae0837af5d3c27564456725382a0c2ae2d82c8b7fefbb71f0e2a9bc166684de475a95c6004ca91eae633f6
-
SSDEEP
12288:0MrIy90LBhXeI8FT0qiDKa97hSRK5TS553BLTRDE2zx81IY9LjaQhkQHJlKSW+Vx:kyAjn8JhJa9ERKU5FBhD7yiYxjnh/odW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-