General
-
Target
d80e893230e0d31c3d3503773cd14fb431096f7c67cc768d7a4d8c1876a7e212
-
Size
753KB
-
Sample
230602-hnvgdaag21
-
MD5
b2ab3dd4a3d2be3d67f040790304cf9e
-
SHA1
a354dc555d27baa8b076ff3590d4aa16a3bc2ebb
-
SHA256
d80e893230e0d31c3d3503773cd14fb431096f7c67cc768d7a4d8c1876a7e212
-
SHA512
d03fd8983f860265dd66d69eb26b8e6cdda272ec3dd897cabaa1c6add01397c77e984b7bf1e358efd5a51ef18169671d0c6cd7b86013917d8db89810a1daa614
-
SSDEEP
12288:bMrBy90BXMC4I20kd+PeC/IYnL8B8sSYUz5Qx0BNt/EOJ8n52Vf0:GyccPFpd+PnI4bY2qxYc752Vc
Static task
static1
Behavioral task
behavioral1
Sample
d80e893230e0d31c3d3503773cd14fb431096f7c67cc768d7a4d8c1876a7e212.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dars
83.97.73.127:19045
-
auth_value
7cd208e6b6c927262304d5d4d88647fd
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
d80e893230e0d31c3d3503773cd14fb431096f7c67cc768d7a4d8c1876a7e212
-
Size
753KB
-
MD5
b2ab3dd4a3d2be3d67f040790304cf9e
-
SHA1
a354dc555d27baa8b076ff3590d4aa16a3bc2ebb
-
SHA256
d80e893230e0d31c3d3503773cd14fb431096f7c67cc768d7a4d8c1876a7e212
-
SHA512
d03fd8983f860265dd66d69eb26b8e6cdda272ec3dd897cabaa1c6add01397c77e984b7bf1e358efd5a51ef18169671d0c6cd7b86013917d8db89810a1daa614
-
SSDEEP
12288:bMrBy90BXMC4I20kd+PeC/IYnL8B8sSYUz5Qx0BNt/EOJ8n52Vf0:GyccPFpd+PnI4bY2qxYc752Vc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-