General
-
Target
eabc8ff3b69aeaa1e597a4b7df99390351ef24f2f4f84bbe804a5d83b75da334
-
Size
722KB
-
Sample
230606-1cs4aagc9z
-
MD5
45e09811c2bddfbecbda0561a2421247
-
SHA1
e5a4b358a0abb318713cf1bfaa8f859943a25cf7
-
SHA256
eabc8ff3b69aeaa1e597a4b7df99390351ef24f2f4f84bbe804a5d83b75da334
-
SHA512
fff6288119cc67fb01d6afd70a5c45bf4f74c655bf62065baa72c323ed333f1c329c66514a43d9b826073b56e2cfb37f406033a90490399d9d841527d0702ce1
-
SSDEEP
12288:gMrAy90zjpxb4pHCVldRjPyFbQXbYgjE/cK75k+iB4NAW7R3dTI:wyY1xXRjP6QXy/Ddk+ieAo3d0
Static task
static1
Behavioral task
behavioral1
Sample
eabc8ff3b69aeaa1e597a4b7df99390351ef24f2f4f84bbe804a5d83b75da334.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
eabc8ff3b69aeaa1e597a4b7df99390351ef24f2f4f84bbe804a5d83b75da334
-
Size
722KB
-
MD5
45e09811c2bddfbecbda0561a2421247
-
SHA1
e5a4b358a0abb318713cf1bfaa8f859943a25cf7
-
SHA256
eabc8ff3b69aeaa1e597a4b7df99390351ef24f2f4f84bbe804a5d83b75da334
-
SHA512
fff6288119cc67fb01d6afd70a5c45bf4f74c655bf62065baa72c323ed333f1c329c66514a43d9b826073b56e2cfb37f406033a90490399d9d841527d0702ce1
-
SSDEEP
12288:gMrAy90zjpxb4pHCVldRjPyFbQXbYgjE/cK75k+iB4NAW7R3dTI:wyY1xXRjP6QXy/Ddk+ieAo3d0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-