General
-
Target
cf13d1c6be30dfe4c08344a655aeeb59329fb49aba5783f8fd328e96b165a8d9
-
Size
779KB
-
Sample
230603-j82lvsgb33
-
MD5
a610e75c16920a78e5ee4069e863b7ed
-
SHA1
c6e95cbf09297de59d85d67a88ab32c65084ff61
-
SHA256
cf13d1c6be30dfe4c08344a655aeeb59329fb49aba5783f8fd328e96b165a8d9
-
SHA512
8550d0b63245887bf620d58108956eeb25d49c830c9821f80c16f44a7d3f74ff805bbca217489652cd5a9470efc1bcde6b21224dbeef364f7d45246eccb857b1
-
SSDEEP
12288:9MrBy90Yhc36wChnfV5sF7lbocPfWjY8gFdTBYrkvRf0OMP2h/+3GK:oyFcutO1Vej0tmIvmOMIK
Static task
static1
Behavioral task
behavioral1
Sample
cf13d1c6be30dfe4c08344a655aeeb59329fb49aba5783f8fd328e96b165a8d9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
cf13d1c6be30dfe4c08344a655aeeb59329fb49aba5783f8fd328e96b165a8d9
-
Size
779KB
-
MD5
a610e75c16920a78e5ee4069e863b7ed
-
SHA1
c6e95cbf09297de59d85d67a88ab32c65084ff61
-
SHA256
cf13d1c6be30dfe4c08344a655aeeb59329fb49aba5783f8fd328e96b165a8d9
-
SHA512
8550d0b63245887bf620d58108956eeb25d49c830c9821f80c16f44a7d3f74ff805bbca217489652cd5a9470efc1bcde6b21224dbeef364f7d45246eccb857b1
-
SSDEEP
12288:9MrBy90Yhc36wChnfV5sF7lbocPfWjY8gFdTBYrkvRf0OMP2h/+3GK:oyFcutO1Vej0tmIvmOMIK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-