General
-
Target
cd84ff7c863cd27f61df96ad5fea5cbb5a6f3c521cdc928e56a4a44014e388e7
-
Size
778KB
-
Sample
230604-ne9gtsca47
-
MD5
2e0cd4fe2722479a1abc89c89dad47b2
-
SHA1
686da891cdf4f5ad5c5282ae2d09c6db386bd1d1
-
SHA256
cd84ff7c863cd27f61df96ad5fea5cbb5a6f3c521cdc928e56a4a44014e388e7
-
SHA512
a805d40b65c6b338bce179dc71f4a820f1221444dcb394a31eb803091765659441f2ff62c32b85185ea904711d4bf003e3a5367492e8a804d1fff93fc76719bd
-
SSDEEP
12288:wMriy90FmjAFs2cFWXAves+Q3zyN4NwpTK9eFmsuP07D6AXAClUlXH:CyRjAFs2cFWXCL+Qa46pAsY073Xn0H
Static task
static1
Behavioral task
behavioral1
Sample
cd84ff7c863cd27f61df96ad5fea5cbb5a6f3c521cdc928e56a4a44014e388e7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
cd84ff7c863cd27f61df96ad5fea5cbb5a6f3c521cdc928e56a4a44014e388e7
-
Size
778KB
-
MD5
2e0cd4fe2722479a1abc89c89dad47b2
-
SHA1
686da891cdf4f5ad5c5282ae2d09c6db386bd1d1
-
SHA256
cd84ff7c863cd27f61df96ad5fea5cbb5a6f3c521cdc928e56a4a44014e388e7
-
SHA512
a805d40b65c6b338bce179dc71f4a820f1221444dcb394a31eb803091765659441f2ff62c32b85185ea904711d4bf003e3a5367492e8a804d1fff93fc76719bd
-
SSDEEP
12288:wMriy90FmjAFs2cFWXAves+Q3zyN4NwpTK9eFmsuP07D6AXAClUlXH:CyRjAFs2cFWXCL+Qa46pAsY073Xn0H
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-