General
-
Target
9c76a2f14676acf280ec0a4db68f05bd4fd6b2a9a86d3237e882eaf09cef96e3
-
Size
1.0MB
-
Sample
230603-e2dh8sfe26
-
MD5
94869d97599a2aaeeecb7f6ddb7faa90
-
SHA1
3e814555a3c6885ad26066f7e393a187ad594a80
-
SHA256
9c76a2f14676acf280ec0a4db68f05bd4fd6b2a9a86d3237e882eaf09cef96e3
-
SHA512
1058dc98a5d8826ac6706ebcaa33d47748776b5c9fdee370d2e8bfd8db9ab8a87fed310fbe16dfa50a1948b1bdff9296fb658cc6af25b6bc5626b450d8601992
-
SSDEEP
24576:Hy6BjeugjYA9CF1LwSdIcZIowwZ35b7MwPMawocfr:Syqugj12jdILows31hwoY
Static task
static1
Behavioral task
behavioral1
Sample
9c76a2f14676acf280ec0a4db68f05bd4fd6b2a9a86d3237e882eaf09cef96e3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.126:19046
-
auth_value
6a764aa41830c77712442516d143bc9c
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
9c76a2f14676acf280ec0a4db68f05bd4fd6b2a9a86d3237e882eaf09cef96e3
-
Size
1.0MB
-
MD5
94869d97599a2aaeeecb7f6ddb7faa90
-
SHA1
3e814555a3c6885ad26066f7e393a187ad594a80
-
SHA256
9c76a2f14676acf280ec0a4db68f05bd4fd6b2a9a86d3237e882eaf09cef96e3
-
SHA512
1058dc98a5d8826ac6706ebcaa33d47748776b5c9fdee370d2e8bfd8db9ab8a87fed310fbe16dfa50a1948b1bdff9296fb658cc6af25b6bc5626b450d8601992
-
SSDEEP
24576:Hy6BjeugjYA9CF1LwSdIcZIowwZ35b7MwPMawocfr:Syqugj12jdILows31hwoY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of SetThreadContext
-