General
-
Target
05012999.exe
-
Size
778KB
-
Sample
230604-nh9xrsca57
-
MD5
292d9b7b4e432dd28347b7dfa3cf4668
-
SHA1
d73ff5d474997e9c78fcd0a895f63a947ec606ed
-
SHA256
aaae8b0e9eff287d8bebafdc8a1ffb934a8b55edc87054211bcf507a1390d5c3
-
SHA512
16bbb3d83a4727f9f280fb4ca8264a6ffba382f2faba82f7c1f097c9b723850cfd026bf8026a6ec9e8242b336b09753f29c32e6dffc866b74e084603e03b7934
-
SSDEEP
12288:5MrMy90BjaT/hY1iPoVQLLjYUDe+dLACebjhzUFNPtbSg61DqAWeCeAOV:hy8UHPoVQkUDDdUlwtWgKfW63V
Static task
static1
Behavioral task
behavioral1
Sample
05012999.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
05012999.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
05012999.exe
-
Size
778KB
-
MD5
292d9b7b4e432dd28347b7dfa3cf4668
-
SHA1
d73ff5d474997e9c78fcd0a895f63a947ec606ed
-
SHA256
aaae8b0e9eff287d8bebafdc8a1ffb934a8b55edc87054211bcf507a1390d5c3
-
SHA512
16bbb3d83a4727f9f280fb4ca8264a6ffba382f2faba82f7c1f097c9b723850cfd026bf8026a6ec9e8242b336b09753f29c32e6dffc866b74e084603e03b7934
-
SSDEEP
12288:5MrMy90BjaT/hY1iPoVQLLjYUDe+dLACebjhzUFNPtbSg61DqAWeCeAOV:hy8UHPoVQkUDDdUlwtWgKfW63V
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-