General
-
Target
32f2c9dc35ac6f0d9ea7175233bc2fe3415df519d6c95ffa339b0320345a65b4
-
Size
786KB
-
Sample
230602-jwtqgsae64
-
MD5
e609276c26d8f089cfa95a7f1abcfa7c
-
SHA1
289d0c5902114914bed55e3ea43a967e18acb1db
-
SHA256
32f2c9dc35ac6f0d9ea7175233bc2fe3415df519d6c95ffa339b0320345a65b4
-
SHA512
62f768a1d131f703accbd94016b279f95c379dddca8881edfb2e03de0bc1ca800b5b9e08423d6dc0b98f97a7109b02e77bd1bbb7b10c600501b050cf4c0b173f
-
SSDEEP
12288:IMr4y90IEes3nPmwDoUnLCeGNOmSqunRvRJv4kyPVur0wqs3xHlPZ/:QyijoUnBGNOhqc3aV+NZ/
Static task
static1
Behavioral task
behavioral1
Sample
32f2c9dc35ac6f0d9ea7175233bc2fe3415df519d6c95ffa339b0320345a65b4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mars
83.97.73.127:19045
-
auth_value
91bd3682cfb50cdc64b6009eb977b766
Extracted
redline
grom
83.97.73.127:19045
-
auth_value
2193aac8692a5e1ec66d9db9fa25ee00
Targets
-
-
Target
32f2c9dc35ac6f0d9ea7175233bc2fe3415df519d6c95ffa339b0320345a65b4
-
Size
786KB
-
MD5
e609276c26d8f089cfa95a7f1abcfa7c
-
SHA1
289d0c5902114914bed55e3ea43a967e18acb1db
-
SHA256
32f2c9dc35ac6f0d9ea7175233bc2fe3415df519d6c95ffa339b0320345a65b4
-
SHA512
62f768a1d131f703accbd94016b279f95c379dddca8881edfb2e03de0bc1ca800b5b9e08423d6dc0b98f97a7109b02e77bd1bbb7b10c600501b050cf4c0b173f
-
SSDEEP
12288:IMr4y90IEes3nPmwDoUnLCeGNOmSqunRvRJv4kyPVur0wqs3xHlPZ/:QyijoUnBGNOhqc3aV+NZ/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-