General
-
Target
15325dcde0071806cd0eb86efaae81c4fc2b2ff62c8a815c7052e4aef03e2268
-
Size
778KB
-
Sample
230604-cw75jsbc9v
-
MD5
2b0d1c9944dc888136e08e03bd8b229b
-
SHA1
14699a5b3182a9f0dd51bea22a91780cb41cf84b
-
SHA256
15325dcde0071806cd0eb86efaae81c4fc2b2ff62c8a815c7052e4aef03e2268
-
SHA512
14fa3b372331d8b330df2516336dbda2e87b71cf6f12691eb09027b6fb01224a883ba49bd4241a89334c920b1161f971119c9951e373c04e8ff146a00327cb39
-
SSDEEP
12288:AMriy90s7yMNVkPQh2P4A5Rs1NPEaA0Goxb/G2FUOJcQ0uJtDvAmA4fAMK80g2c:SyVunlJRWEki2GzQlHEmr88vd
Static task
static1
Behavioral task
behavioral1
Sample
15325dcde0071806cd0eb86efaae81c4fc2b2ff62c8a815c7052e4aef03e2268.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
15325dcde0071806cd0eb86efaae81c4fc2b2ff62c8a815c7052e4aef03e2268
-
Size
778KB
-
MD5
2b0d1c9944dc888136e08e03bd8b229b
-
SHA1
14699a5b3182a9f0dd51bea22a91780cb41cf84b
-
SHA256
15325dcde0071806cd0eb86efaae81c4fc2b2ff62c8a815c7052e4aef03e2268
-
SHA512
14fa3b372331d8b330df2516336dbda2e87b71cf6f12691eb09027b6fb01224a883ba49bd4241a89334c920b1161f971119c9951e373c04e8ff146a00327cb39
-
SSDEEP
12288:AMriy90s7yMNVkPQh2P4A5Rs1NPEaA0Goxb/G2FUOJcQ0uJtDvAmA4fAMK80g2c:SyVunlJRWEki2GzQlHEmr88vd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-