General
-
Target
63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930
-
Size
794KB
-
Sample
230603-htc5aagc4v
-
MD5
fc38859f5f2d193016c9be5b0a4f50ca
-
SHA1
b127934ec2cca8e8eeacda5beccf2a92f392469b
-
SHA256
63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930
-
SHA512
f0aa9c5cff482d4258988791fc0f2e232605e1ba0e188a497ea19b17d8797dd625efe0cfbc57b4be631fa2240e6c1c180eb95746789f8ed368cc89369e671341
-
SSDEEP
12288:bMrmy90dDcv9batXj7+W7c5lvj0A2BDIy0YjBPvgw4j2DLRfTQtBWGEvWzD/PJC:dyBxa1j7p7a2Vv02JQ2HxTjvWHBC
Static task
static1
Behavioral task
behavioral1
Sample
63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930
-
Size
794KB
-
MD5
fc38859f5f2d193016c9be5b0a4f50ca
-
SHA1
b127934ec2cca8e8eeacda5beccf2a92f392469b
-
SHA256
63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930
-
SHA512
f0aa9c5cff482d4258988791fc0f2e232605e1ba0e188a497ea19b17d8797dd625efe0cfbc57b4be631fa2240e6c1c180eb95746789f8ed368cc89369e671341
-
SSDEEP
12288:bMrmy90dDcv9batXj7+W7c5lvj0A2BDIy0YjBPvgw4j2DLRfTQtBWGEvWzD/PJC:dyBxa1j7p7a2Vv02JQ2HxTjvWHBC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-