General
-
Target
d28547aec29f0f35277799b3ee8eddcf5c118e1f0fb20dfd4eead676259bb429
-
Size
779KB
-
Sample
230603-2a9tpaac27
-
MD5
74c92d0cd52140f6a1174975c55e17e8
-
SHA1
a939d77f7bc20859489949de16d173882a2a2fd7
-
SHA256
d28547aec29f0f35277799b3ee8eddcf5c118e1f0fb20dfd4eead676259bb429
-
SHA512
81a2dd08587239ccf3b900168ba3af19e78ef637925733fd0c97c11e2754063a438032da72d257a15d7fa3f6ad12747ea3b6f9050ca66d75cbf1f66e9276ce31
-
SSDEEP
12288:JMrKy90/H2ye5zX6uWuMLFgzMAsH3KrQoym5a5b+MkNKeMAyVgk6tWn7rxRP:jymWyczX6RLFuG3KQ+MkN/kr3
Static task
static1
Behavioral task
behavioral1
Sample
d28547aec29f0f35277799b3ee8eddcf5c118e1f0fb20dfd4eead676259bb429.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
d28547aec29f0f35277799b3ee8eddcf5c118e1f0fb20dfd4eead676259bb429
-
Size
779KB
-
MD5
74c92d0cd52140f6a1174975c55e17e8
-
SHA1
a939d77f7bc20859489949de16d173882a2a2fd7
-
SHA256
d28547aec29f0f35277799b3ee8eddcf5c118e1f0fb20dfd4eead676259bb429
-
SHA512
81a2dd08587239ccf3b900168ba3af19e78ef637925733fd0c97c11e2754063a438032da72d257a15d7fa3f6ad12747ea3b6f9050ca66d75cbf1f66e9276ce31
-
SSDEEP
12288:JMrKy90/H2ye5zX6uWuMLFgzMAsH3KrQoym5a5b+MkNKeMAyVgk6tWn7rxRP:jymWyczX6RLFuG3KQ+MkN/kr3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-