General
-
Target
tmp
-
Size
778KB
-
Sample
230604-fejbmsbf8z
-
MD5
c402caf67560e8bf41bda00e32d529b5
-
SHA1
1c851ea332fbf950bf8d0ab7317d09d1608d3520
-
SHA256
e8459ad30b04379c618d96dda52771053190ca525685df43be50749f506f8729
-
SHA512
fe1223addf73647036809773fa1567a863916418acd88433c06055ac320875e6926e2d7734c601f40f55c5cbcef48b7bc8bd6193f1fd7bfb053d75bdc170a776
-
SSDEEP
12288:mMrIy90TCXAgDKa28Azvn590EBaMbUG4sG8Kajd8D500dDdWFtYabQrD1Ao6p9Vb:aynOu0vngEBrUG4shD0dIFGLKokN8I
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
tmp
-
Size
778KB
-
MD5
c402caf67560e8bf41bda00e32d529b5
-
SHA1
1c851ea332fbf950bf8d0ab7317d09d1608d3520
-
SHA256
e8459ad30b04379c618d96dda52771053190ca525685df43be50749f506f8729
-
SHA512
fe1223addf73647036809773fa1567a863916418acd88433c06055ac320875e6926e2d7734c601f40f55c5cbcef48b7bc8bd6193f1fd7bfb053d75bdc170a776
-
SSDEEP
12288:mMrIy90TCXAgDKa28Azvn590EBaMbUG4sG8Kajd8D500dDdWFtYabQrD1Ao6p9Vb:aynOu0vngEBrUG4shD0dIFGLKokN8I
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-