General
-
Target
d44b3a72572a54fa3701aa12ade7921d6d93e0d2b2835047ab682203150ac796
-
Size
755KB
-
Sample
230602-hl8wzsac66
-
MD5
200714f093f5c870f5e4c23357ad0345
-
SHA1
4ce78daee6c7fc2f3a216c694213ca1d71a6c48e
-
SHA256
d44b3a72572a54fa3701aa12ade7921d6d93e0d2b2835047ab682203150ac796
-
SHA512
d0dcc7cadb95d8c35ba5c94c3a8015304b9a47b74d057b124dc9770958b8f9815e0ffb71389dc6ec588dcbae1eb4a18b6fc1bae94fa6cd339acadc5c315a0861
-
SSDEEP
12288:8Mrey903iXZyxoZa3Wz5cZyxdQhoDYrnGXxJ8EGQ6HFtAEEi/PNe5Xpuwt:yybZyxoZZfdQhEYTGXrhQukPN+t
Static task
static1
Behavioral task
behavioral1
Sample
d44b3a72572a54fa3701aa12ade7921d6d93e0d2b2835047ab682203150ac796.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
d44b3a72572a54fa3701aa12ade7921d6d93e0d2b2835047ab682203150ac796
-
Size
755KB
-
MD5
200714f093f5c870f5e4c23357ad0345
-
SHA1
4ce78daee6c7fc2f3a216c694213ca1d71a6c48e
-
SHA256
d44b3a72572a54fa3701aa12ade7921d6d93e0d2b2835047ab682203150ac796
-
SHA512
d0dcc7cadb95d8c35ba5c94c3a8015304b9a47b74d057b124dc9770958b8f9815e0ffb71389dc6ec588dcbae1eb4a18b6fc1bae94fa6cd339acadc5c315a0861
-
SSDEEP
12288:8Mrey903iXZyxoZa3Wz5cZyxdQhoDYrnGXxJ8EGQ6HFtAEEi/PNe5Xpuwt:yybZyxoZZfdQhEYTGXrhQukPN+t
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-