General
-
Target
80725c352374d0c73861fd622c56278e5c41e0420fdaf48acecec4d864b4c3f7
-
Size
755KB
-
Sample
230602-hkxgkaac57
-
MD5
89032a089d649871c1cc305773267d33
-
SHA1
955aab719aff2ab9e905cc5aba400b7b7d66a77b
-
SHA256
80725c352374d0c73861fd622c56278e5c41e0420fdaf48acecec4d864b4c3f7
-
SHA512
e9f3b6fc72a68bcf14b4c88d1c2ed8b006140078d6de6b8fcd717d3dd40d581021a58d0d47d4f83f0c740514cbf6b01ddfd28c27205887a415ca235e09782afb
-
SSDEEP
12288:6MrPy9025HyeORCiiOGKmEDlsLri6y/1MYTTHnXAn6YOvcIWAx:dyV5HvORCP9RQ1TTC+ak
Static task
static1
Behavioral task
behavioral1
Sample
80725c352374d0c73861fd622c56278e5c41e0420fdaf48acecec4d864b4c3f7.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dars
83.97.73.127:19045
-
auth_value
7cd208e6b6c927262304d5d4d88647fd
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
80725c352374d0c73861fd622c56278e5c41e0420fdaf48acecec4d864b4c3f7
-
Size
755KB
-
MD5
89032a089d649871c1cc305773267d33
-
SHA1
955aab719aff2ab9e905cc5aba400b7b7d66a77b
-
SHA256
80725c352374d0c73861fd622c56278e5c41e0420fdaf48acecec4d864b4c3f7
-
SHA512
e9f3b6fc72a68bcf14b4c88d1c2ed8b006140078d6de6b8fcd717d3dd40d581021a58d0d47d4f83f0c740514cbf6b01ddfd28c27205887a415ca235e09782afb
-
SSDEEP
12288:6MrPy9025HyeORCiiOGKmEDlsLri6y/1MYTTHnXAn6YOvcIWAx:dyV5HvORCP9RQ1TTC+ak
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-