General
-
Target
97f882e443c840085e420b4d5c113e4b7a8119e41c77a3fac1b99709119b8bc2
-
Size
777KB
-
Sample
230603-kw9blsgc82
-
MD5
e16b5e4097b5036414f357737ede178a
-
SHA1
7133e3a5878b6eb4ed6609b808c2d6f44d987f57
-
SHA256
97f882e443c840085e420b4d5c113e4b7a8119e41c77a3fac1b99709119b8bc2
-
SHA512
15290d5b5ae27d33122da88664c3f3d5842839464e859166085efc8e7f76ebf1787f22624ea0193620c2c0172464180b826d37637b501c5eaac8e8300139da4c
-
SSDEEP
12288:PMrEy90zwkxmmsgbyopFhz8C8za3wPS/a4p6jEQGQTuwjmjlR50V5P58R:jyWrs7ozJGAiynMvglEV54
Static task
static1
Behavioral task
behavioral1
Sample
97f882e443c840085e420b4d5c113e4b7a8119e41c77a3fac1b99709119b8bc2.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
97f882e443c840085e420b4d5c113e4b7a8119e41c77a3fac1b99709119b8bc2
-
Size
777KB
-
MD5
e16b5e4097b5036414f357737ede178a
-
SHA1
7133e3a5878b6eb4ed6609b808c2d6f44d987f57
-
SHA256
97f882e443c840085e420b4d5c113e4b7a8119e41c77a3fac1b99709119b8bc2
-
SHA512
15290d5b5ae27d33122da88664c3f3d5842839464e859166085efc8e7f76ebf1787f22624ea0193620c2c0172464180b826d37637b501c5eaac8e8300139da4c
-
SSDEEP
12288:PMrEy90zwkxmmsgbyopFhz8C8za3wPS/a4p6jEQGQTuwjmjlR50V5P58R:jyWrs7ozJGAiynMvglEV54
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-