General
-
Target
585081efbc29a699fd6fa2023072f2dafcfe8bdf14ab1b469d847705f2227fc5
-
Size
780KB
-
Sample
230603-m2c7gagh51
-
MD5
6a524d6e5da07613b45de896fcd4fc8c
-
SHA1
a74886b85f4b5eb2bae86685f8bda3b5cebd01bd
-
SHA256
585081efbc29a699fd6fa2023072f2dafcfe8bdf14ab1b469d847705f2227fc5
-
SHA512
ec54fb900cf1d949b98aa4ecb55bf92d9ab08c9dcf10753b527f7817651966841880bcba7ed69f54ed09319ff0200e0a6ab5f23318c8001aba182884e2c2546a
-
SSDEEP
12288:TMruy90Bg82nHjzhF24geetSWNtUpORQOS0ASUg0CzN9jj7YzPjeweA0tY:dymg8cHjzO7r/U0RQOS0FRj7YH8i
Static task
static1
Behavioral task
behavioral1
Sample
585081efbc29a699fd6fa2023072f2dafcfe8bdf14ab1b469d847705f2227fc5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
musa
83.97.73.126:19046
-
auth_value
745cd242a52ab79c9c9026155d62f359
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
585081efbc29a699fd6fa2023072f2dafcfe8bdf14ab1b469d847705f2227fc5
-
Size
780KB
-
MD5
6a524d6e5da07613b45de896fcd4fc8c
-
SHA1
a74886b85f4b5eb2bae86685f8bda3b5cebd01bd
-
SHA256
585081efbc29a699fd6fa2023072f2dafcfe8bdf14ab1b469d847705f2227fc5
-
SHA512
ec54fb900cf1d949b98aa4ecb55bf92d9ab08c9dcf10753b527f7817651966841880bcba7ed69f54ed09319ff0200e0a6ab5f23318c8001aba182884e2c2546a
-
SSDEEP
12288:TMruy90Bg82nHjzhF24geetSWNtUpORQOS0ASUg0CzN9jj7YzPjeweA0tY:dymg8cHjzO7r/U0RQOS0FRj7YH8i
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-