General
-
Target
f35868f2944071a9925808762288e220a1a19dacade1a38c49480c05a0b95eef
-
Size
778KB
-
Sample
230603-l7663agd87
-
MD5
10e8a8d427d95e7d73d66b05c6b9b06a
-
SHA1
86ca579364fb679f228251f2e940103bae071299
-
SHA256
f35868f2944071a9925808762288e220a1a19dacade1a38c49480c05a0b95eef
-
SHA512
affecbe362ce879840e4fadfa3d66fbdde368a02ca7b8be2b94b9242a43567c1b2d2a166ad37b0eff0ec4af32ccc96f36aea80770f1c0adefc55dde7c7cb0c6a
-
SSDEEP
12288:DMrjy90ZGQ21vNcpLnoVzyLr26ROXdSyWlSsfivRK0pMPVGfmwJSE:oyCGQ21vNuuzyLtOXdSpldfivppMk+O
Static task
static1
Behavioral task
behavioral1
Sample
f35868f2944071a9925808762288e220a1a19dacade1a38c49480c05a0b95eef.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
f35868f2944071a9925808762288e220a1a19dacade1a38c49480c05a0b95eef
-
Size
778KB
-
MD5
10e8a8d427d95e7d73d66b05c6b9b06a
-
SHA1
86ca579364fb679f228251f2e940103bae071299
-
SHA256
f35868f2944071a9925808762288e220a1a19dacade1a38c49480c05a0b95eef
-
SHA512
affecbe362ce879840e4fadfa3d66fbdde368a02ca7b8be2b94b9242a43567c1b2d2a166ad37b0eff0ec4af32ccc96f36aea80770f1c0adefc55dde7c7cb0c6a
-
SSDEEP
12288:DMrjy90ZGQ21vNcpLnoVzyLr26ROXdSyWlSsfivRK0pMPVGfmwJSE:oyCGQ21vNuuzyLtOXdSpldfivppMk+O
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-