General
-
Target
9b2ad9ceba0734d27958f483f1a6eb4c026478c9697d90a22687b4d42c21cda6
-
Size
778KB
-
Sample
230603-mb94hsgg9z
-
MD5
d4511bbea540df7ef96a850559918c58
-
SHA1
2aa0bf414e9e5ebec99fb5a2295c2c82fd174a6d
-
SHA256
9b2ad9ceba0734d27958f483f1a6eb4c026478c9697d90a22687b4d42c21cda6
-
SHA512
85c8b3c3928bcc1631d7dfd34e2a2d8254fe28b6c03ec5fecc638e0bcd2892bd6c61ee01476bf5cc24bf9c6c00df43229a52fda17c956a518f20634eea888b7f
-
SSDEEP
12288:GMrTy90kGfXvel/afsa5lRzZaf5EXMJdzwmEk+lRV055PPCb:1yAPOGZ78Jdzrh+lA55Q
Static task
static1
Behavioral task
behavioral1
Sample
9b2ad9ceba0734d27958f483f1a6eb4c026478c9697d90a22687b4d42c21cda6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
9b2ad9ceba0734d27958f483f1a6eb4c026478c9697d90a22687b4d42c21cda6
-
Size
778KB
-
MD5
d4511bbea540df7ef96a850559918c58
-
SHA1
2aa0bf414e9e5ebec99fb5a2295c2c82fd174a6d
-
SHA256
9b2ad9ceba0734d27958f483f1a6eb4c026478c9697d90a22687b4d42c21cda6
-
SHA512
85c8b3c3928bcc1631d7dfd34e2a2d8254fe28b6c03ec5fecc638e0bcd2892bd6c61ee01476bf5cc24bf9c6c00df43229a52fda17c956a518f20634eea888b7f
-
SSDEEP
12288:GMrTy90kGfXvel/afsa5lRzZaf5EXMJdzwmEk+lRV055PPCb:1yAPOGZ78Jdzrh+lA55Q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-