General
-
Target
d4bc6cd8bdaa6a27cef97e067f2fff32e48942b39b4669d369f07d9a89707b9f
-
Size
625KB
-
Sample
230604-pw9plach3s
-
MD5
6aecd87f27dc73b38b0a8162499f4f49
-
SHA1
f63062f21589e14a77ed8779f252be9e5cf59f26
-
SHA256
d4bc6cd8bdaa6a27cef97e067f2fff32e48942b39b4669d369f07d9a89707b9f
-
SHA512
0a235525617d58a25de27bd8d28138918808d72e0b299e9a27cdfe91af0d396f2579063245f4c5acd003778f0569cbe1500b63f9451594c5f556ae2a1a834f9a
-
SSDEEP
12288:oMr+y90GHnBNdmCsMmpRdMEteimxE6LqrpQPgrjta8rNfQQxS4S2JEqHk:myL0Cud9teo6LgpGg1rNzxtEqHk
Static task
static1
Behavioral task
behavioral1
Sample
d4bc6cd8bdaa6a27cef97e067f2fff32e48942b39b4669d369f07d9a89707b9f.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
musa
83.97.73.126:19046
-
auth_value
745cd242a52ab79c9c9026155d62f359
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Targets
-
-
Target
d4bc6cd8bdaa6a27cef97e067f2fff32e48942b39b4669d369f07d9a89707b9f
-
Size
625KB
-
MD5
6aecd87f27dc73b38b0a8162499f4f49
-
SHA1
f63062f21589e14a77ed8779f252be9e5cf59f26
-
SHA256
d4bc6cd8bdaa6a27cef97e067f2fff32e48942b39b4669d369f07d9a89707b9f
-
SHA512
0a235525617d58a25de27bd8d28138918808d72e0b299e9a27cdfe91af0d396f2579063245f4c5acd003778f0569cbe1500b63f9451594c5f556ae2a1a834f9a
-
SSDEEP
12288:oMr+y90GHnBNdmCsMmpRdMEteimxE6LqrpQPgrjta8rNfQQxS4S2JEqHk:myL0Cud9teo6LgpGg1rNzxtEqHk
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-