General
-
Target
fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf
-
Size
793KB
-
Sample
230603-jdehvaga22
-
MD5
0fbbc41d615d8a1813c6c72c5e037847
-
SHA1
0b7cbc1a95e46ff4f517eb2b96620e314821b4f2
-
SHA256
fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf
-
SHA512
5268f6e0675064f8b16e0ce32781db9abd911d6a123ce2ba180c3264e0bcbdf7aa6a5ac4031ad5ef9a78fdee12215b3ca3b66e719bf38034b371f1027d7232a3
-
SSDEEP
12288:WMrBy90FE10Yc/LJ1kvFxExdVActmjSMYjHXacTdDWzDtakb:nyOTJWmmctmjSMiachDWVRb
Static task
static1
Behavioral task
behavioral1
Sample
fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf
-
Size
793KB
-
MD5
0fbbc41d615d8a1813c6c72c5e037847
-
SHA1
0b7cbc1a95e46ff4f517eb2b96620e314821b4f2
-
SHA256
fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf
-
SHA512
5268f6e0675064f8b16e0ce32781db9abd911d6a123ce2ba180c3264e0bcbdf7aa6a5ac4031ad5ef9a78fdee12215b3ca3b66e719bf38034b371f1027d7232a3
-
SSDEEP
12288:WMrBy90FE10Yc/LJ1kvFxExdVActmjSMYjHXacTdDWzDtakb:nyOTJWmmctmjSMiachDWVRb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-