General
-
Target
41d6d41a75c756f66e6a68cedbd55bb589271087a4f7777ae6f7c3c1ed0a1a6f
-
Size
793KB
-
Sample
230603-gjzpvsgb3w
-
MD5
c4300e6911bb0db63dfd04a46834853c
-
SHA1
c9ac68146350d6a75eaff4d6b8a3eb6abe77afb8
-
SHA256
41d6d41a75c756f66e6a68cedbd55bb589271087a4f7777ae6f7c3c1ed0a1a6f
-
SHA512
033730912087aacaf5a7395baf403fa2f8bbe6e50a9a243f7cedcbc13e92c30fec884c3975313ab2fbfa95b2f58cbe21121b425327432e5d98500c6d7d19cef1
-
SSDEEP
24576:VypHoflX2196TRM2cY1V37R6nAA4Wg5p:wpHoflX2SRM2x1V37R6h/g
Static task
static1
Behavioral task
behavioral1
Sample
41d6d41a75c756f66e6a68cedbd55bb589271087a4f7777ae6f7c3c1ed0a1a6f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
41d6d41a75c756f66e6a68cedbd55bb589271087a4f7777ae6f7c3c1ed0a1a6f
-
Size
793KB
-
MD5
c4300e6911bb0db63dfd04a46834853c
-
SHA1
c9ac68146350d6a75eaff4d6b8a3eb6abe77afb8
-
SHA256
41d6d41a75c756f66e6a68cedbd55bb589271087a4f7777ae6f7c3c1ed0a1a6f
-
SHA512
033730912087aacaf5a7395baf403fa2f8bbe6e50a9a243f7cedcbc13e92c30fec884c3975313ab2fbfa95b2f58cbe21121b425327432e5d98500c6d7d19cef1
-
SSDEEP
24576:VypHoflX2196TRM2cY1V37R6nAA4Wg5p:wpHoflX2SRM2x1V37R6h/g
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-