General
-
Target
c0381bb4aaf380e9c4f14db3a445745b.exe
-
Size
721KB
-
Sample
230607-s5w2msch9y
-
MD5
c0381bb4aaf380e9c4f14db3a445745b
-
SHA1
91833cc5bedc4276e0b274ad3f0f23d3618ac29e
-
SHA256
25135e4a4a2701f6dc8be4db4822aa877b486a39dbb7110c485b93cfe97c9fa0
-
SHA512
70d0c432ca7c5033c4ce6c43708978795deab3b55a9844927537ea628c5faf80f343e1a742dbbe82e2ea3769f3a21187b202b0a047047eaa4972501c53d3072d
-
SSDEEP
12288:xMrny907k6FPP6cy+Cv8JHAejteOKHGPDfSFzxA//l3YYs:iyqxPt1JgeQO0GOFzxA//l3YYs
Static task
static1
Behavioral task
behavioral1
Sample
c0381bb4aaf380e9c4f14db3a445745b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c0381bb4aaf380e9c4f14db3a445745b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.129:19068
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
c0381bb4aaf380e9c4f14db3a445745b.exe
-
Size
721KB
-
MD5
c0381bb4aaf380e9c4f14db3a445745b
-
SHA1
91833cc5bedc4276e0b274ad3f0f23d3618ac29e
-
SHA256
25135e4a4a2701f6dc8be4db4822aa877b486a39dbb7110c485b93cfe97c9fa0
-
SHA512
70d0c432ca7c5033c4ce6c43708978795deab3b55a9844927537ea628c5faf80f343e1a742dbbe82e2ea3769f3a21187b202b0a047047eaa4972501c53d3072d
-
SSDEEP
12288:xMrny907k6FPP6cy+Cv8JHAejteOKHGPDfSFzxA//l3YYs:iyqxPt1JgeQO0GOFzxA//l3YYs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-