General
-
Target
ae9183db47ed4edcef12d7951be87d82b90029a941a9a0e49d35c9a6c515e895
-
Size
779KB
-
Sample
230603-2hctxsac38
-
MD5
e8b0728f78c8090598749c84ebb43b55
-
SHA1
561db39a51d7fd63d386bd38c8477dd64c1836a6
-
SHA256
ae9183db47ed4edcef12d7951be87d82b90029a941a9a0e49d35c9a6c515e895
-
SHA512
f225de768aba7327d1d26b6c32bfe8c40f042d3601d183da0f81e27384c90fa93eccd375241be09ccd120b64d51e5d266c262a7362c591c694df34bbfa196d10
-
SSDEEP
12288:MMrey90anxCJipBFZMgDTgKn7zIcp0prfgwCUuD4LKStyxCWBa3sHA2aDgs63An4:KyTQOF5pV0pfFegyx0GvtsRSgm
Static task
static1
Behavioral task
behavioral1
Sample
ae9183db47ed4edcef12d7951be87d82b90029a941a9a0e49d35c9a6c515e895.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
ae9183db47ed4edcef12d7951be87d82b90029a941a9a0e49d35c9a6c515e895
-
Size
779KB
-
MD5
e8b0728f78c8090598749c84ebb43b55
-
SHA1
561db39a51d7fd63d386bd38c8477dd64c1836a6
-
SHA256
ae9183db47ed4edcef12d7951be87d82b90029a941a9a0e49d35c9a6c515e895
-
SHA512
f225de768aba7327d1d26b6c32bfe8c40f042d3601d183da0f81e27384c90fa93eccd375241be09ccd120b64d51e5d266c262a7362c591c694df34bbfa196d10
-
SSDEEP
12288:MMrey90anxCJipBFZMgDTgKn7zIcp0prfgwCUuD4LKStyxCWBa3sHA2aDgs63An4:KyTQOF5pV0pfFegyx0GvtsRSgm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-