General
-
Target
fb0bc4b9628eadbc913153d7e1e68e75e3412ab9cdd90a602079043b5d8ec63c
-
Size
778KB
-
Sample
230603-magqksgd93
-
MD5
47a813b9b435800f952d89abc173f511
-
SHA1
af9838d133ba0aa1bad0f78cef097b3a96771e54
-
SHA256
fb0bc4b9628eadbc913153d7e1e68e75e3412ab9cdd90a602079043b5d8ec63c
-
SHA512
b0bfe7c5f97574a411164ab1e3a1b4fa963e411a22e77083d5e5ef7d995fb09395dc90cfd9d763f73074cdcfecf0a83f7425d91fd8c7a4ca5ea9e17220fe80e7
-
SSDEEP
24576:hyRkwKkgp26Cr9hOZIXFDd+lllm5n8yM1:U+QR2ZIXxMll0nj
Static task
static1
Behavioral task
behavioral1
Sample
fb0bc4b9628eadbc913153d7e1e68e75e3412ab9cdd90a602079043b5d8ec63c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
fb0bc4b9628eadbc913153d7e1e68e75e3412ab9cdd90a602079043b5d8ec63c
-
Size
778KB
-
MD5
47a813b9b435800f952d89abc173f511
-
SHA1
af9838d133ba0aa1bad0f78cef097b3a96771e54
-
SHA256
fb0bc4b9628eadbc913153d7e1e68e75e3412ab9cdd90a602079043b5d8ec63c
-
SHA512
b0bfe7c5f97574a411164ab1e3a1b4fa963e411a22e77083d5e5ef7d995fb09395dc90cfd9d763f73074cdcfecf0a83f7425d91fd8c7a4ca5ea9e17220fe80e7
-
SSDEEP
24576:hyRkwKkgp26Cr9hOZIXFDd+lllm5n8yM1:U+QR2ZIXxMll0nj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-