General
-
Target
c6b2e93fa828c3d2a1ab0b21db9af0b5f86a7079a9a2b3f768e0398e00ce9f39
-
Size
752KB
-
Sample
230607-3tctqshd35
-
MD5
110e66ed9ae1fbeaf916b66db5232fbc
-
SHA1
e1f0f327cb69b61c93c5619c7f13fa9a73acad76
-
SHA256
c6b2e93fa828c3d2a1ab0b21db9af0b5f86a7079a9a2b3f768e0398e00ce9f39
-
SHA512
97db39509c6182f61648a113330cdd8187f8462626dbcc2d62885f743bd669983d9de77d1d566f7b2e30d03e8cfc0cbc9cde5047230f415054cbb156d109008a
-
SSDEEP
12288:DMrYy909bq5KKiH2MG5xQONXDKhAQ+3tLC5X81+5jfj4TzCGhCxnw6L:zyGzXG5h3xY5Njfj4aGhH6L
Static task
static1
Behavioral task
behavioral1
Sample
c6b2e93fa828c3d2a1ab0b21db9af0b5f86a7079a9a2b3f768e0398e00ce9f39.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.129:19068
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
c6b2e93fa828c3d2a1ab0b21db9af0b5f86a7079a9a2b3f768e0398e00ce9f39
-
Size
752KB
-
MD5
110e66ed9ae1fbeaf916b66db5232fbc
-
SHA1
e1f0f327cb69b61c93c5619c7f13fa9a73acad76
-
SHA256
c6b2e93fa828c3d2a1ab0b21db9af0b5f86a7079a9a2b3f768e0398e00ce9f39
-
SHA512
97db39509c6182f61648a113330cdd8187f8462626dbcc2d62885f743bd669983d9de77d1d566f7b2e30d03e8cfc0cbc9cde5047230f415054cbb156d109008a
-
SSDEEP
12288:DMrYy909bq5KKiH2MG5xQONXDKhAQ+3tLC5X81+5jfj4TzCGhCxnw6L:zyGzXG5h3xY5Njfj4aGhH6L
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-