General
-
Target
1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3
-
Size
778KB
-
Sample
230603-jx4bbagd6z
-
MD5
0f14f9b11c933224678665080c6438a7
-
SHA1
ffb7ed6e8cb6d82f438ab44e4f7b88be8dd5afa5
-
SHA256
1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3
-
SHA512
44a6f2817c7274ccf96972b4e5fcbc086f4342c18220c866e2bef8598752cfd974eef4b2849fc2c5954b8749d97184667a74a6c41329b7f80653540581aac751
-
SSDEEP
12288:TMrzy90NWwM1bXws5rDvbpN9Q8srlc2HzcPvRK03MPAOj:IylT1ss5rDzSRJzcPv13M5j
Static task
static1
Behavioral task
behavioral1
Sample
1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3
-
Size
778KB
-
MD5
0f14f9b11c933224678665080c6438a7
-
SHA1
ffb7ed6e8cb6d82f438ab44e4f7b88be8dd5afa5
-
SHA256
1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3
-
SHA512
44a6f2817c7274ccf96972b4e5fcbc086f4342c18220c866e2bef8598752cfd974eef4b2849fc2c5954b8749d97184667a74a6c41329b7f80653540581aac751
-
SSDEEP
12288:TMrzy90NWwM1bXws5rDvbpN9Q8srlc2HzcPvRK03MPAOj:IylT1ss5rDzSRJzcPv13M5j
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-