General
-
Target
9f9f625db8f337b0aa93c112075eb80fb4383861e2c021c361e4025a0fda58e6
-
Size
777KB
-
Sample
230604-kskh3scc51
-
MD5
70bd1d729d4b0946fa7799df62c4d307
-
SHA1
5b6e9bc45ee5a3266f81752a6454565af6b5bbee
-
SHA256
9f9f625db8f337b0aa93c112075eb80fb4383861e2c021c361e4025a0fda58e6
-
SHA512
835171742aa579fc2b252dbf6e26053f4ab390aa841ae7461edc693ae7f20a3c883564e57031ce00427ba692fe42e8fe0447dc85a24b156e1a7abe17b1dbffd5
-
SSDEEP
12288:yMriy90E5HwtJxB6Radvt8aWWm9NL11dYfH/DlSjON/PDpAK6f0oMPNMF:UyrsxB6RGvt07N6HZSjeuKTMF
Static task
static1
Behavioral task
behavioral1
Sample
9f9f625db8f337b0aa93c112075eb80fb4383861e2c021c361e4025a0fda58e6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
9f9f625db8f337b0aa93c112075eb80fb4383861e2c021c361e4025a0fda58e6
-
Size
777KB
-
MD5
70bd1d729d4b0946fa7799df62c4d307
-
SHA1
5b6e9bc45ee5a3266f81752a6454565af6b5bbee
-
SHA256
9f9f625db8f337b0aa93c112075eb80fb4383861e2c021c361e4025a0fda58e6
-
SHA512
835171742aa579fc2b252dbf6e26053f4ab390aa841ae7461edc693ae7f20a3c883564e57031ce00427ba692fe42e8fe0447dc85a24b156e1a7abe17b1dbffd5
-
SSDEEP
12288:yMriy90E5HwtJxB6Radvt8aWWm9NL11dYfH/DlSjON/PDpAK6f0oMPNMF:UyrsxB6RGvt07N6HZSjeuKTMF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-