General
-
Target
428c9fd792fd70f3333872b87dc3bfaad81ee570d918fbfc5d502679e433f41c
-
Size
777KB
-
Sample
230604-ajtehsba3t
-
MD5
86375f5138f6ce7cc9c938277332a89e
-
SHA1
b580675338e2c8056e4c1028aa9511bf4937e221
-
SHA256
428c9fd792fd70f3333872b87dc3bfaad81ee570d918fbfc5d502679e433f41c
-
SHA512
e966986c3d76cfbbd8a156fd0b3a889f90560289a86c9cb4b7e8c41e6c77eb7a52fac4eee196f2ba915c60913b6a9cd905c590f3042a0cb0dbd3048bb5d3f888
-
SSDEEP
12288:8MrNy905isM79Nem35GM8ALmrSYd4AScVYI9KBZ1eHEUnpDDqAZ60pvdE:BybsMTf35fVYJbVWQnDfZ7G
Static task
static1
Behavioral task
behavioral1
Sample
428c9fd792fd70f3333872b87dc3bfaad81ee570d918fbfc5d502679e433f41c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
428c9fd792fd70f3333872b87dc3bfaad81ee570d918fbfc5d502679e433f41c
-
Size
777KB
-
MD5
86375f5138f6ce7cc9c938277332a89e
-
SHA1
b580675338e2c8056e4c1028aa9511bf4937e221
-
SHA256
428c9fd792fd70f3333872b87dc3bfaad81ee570d918fbfc5d502679e433f41c
-
SHA512
e966986c3d76cfbbd8a156fd0b3a889f90560289a86c9cb4b7e8c41e6c77eb7a52fac4eee196f2ba915c60913b6a9cd905c590f3042a0cb0dbd3048bb5d3f888
-
SSDEEP
12288:8MrNy905isM79Nem35GM8ALmrSYd4AScVYI9KBZ1eHEUnpDDqAZ60pvdE:BybsMTf35fVYJbVWQnDfZ7G
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-