General
-
Target
cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3
-
Size
778KB
-
Sample
230603-whjdtahe24
-
MD5
bfc9408af6416ce4f5d35c1b6a3c00a6
-
SHA1
c7530e4584db26fa4a14bf1e62546f57c18f1ae0
-
SHA256
cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3
-
SHA512
df5f8f18f163e53d679908b1eff4133c42a906af7aa4a732594386ebe09d82a5a1722193f66fa5d77b597f035ebe1454aeb84ef121a07188abf7370e5f9ea975
-
SSDEEP
12288:DMrny905TC7wS0KRCY9Kgio+Lkge34KfIRP3mtzQSED3AAkmKD9Nx:UyMCdBxiosreLfo3mtzAUAYJj
Static task
static1
Behavioral task
behavioral1
Sample
cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
musa
83.97.73.126:19046
-
auth_value
745cd242a52ab79c9c9026155d62f359
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3
-
Size
778KB
-
MD5
bfc9408af6416ce4f5d35c1b6a3c00a6
-
SHA1
c7530e4584db26fa4a14bf1e62546f57c18f1ae0
-
SHA256
cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3
-
SHA512
df5f8f18f163e53d679908b1eff4133c42a906af7aa4a732594386ebe09d82a5a1722193f66fa5d77b597f035ebe1454aeb84ef121a07188abf7370e5f9ea975
-
SSDEEP
12288:DMrny905TC7wS0KRCY9Kgio+Lkge34KfIRP3mtzQSED3AAkmKD9Nx:UyMCdBxiosreLfo3mtzAUAYJj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-