General
-
Target
4fee34e10f0bccfb036b49df34b7e2ac9029edc57a6e34433a4d004dc737e974
-
Size
753KB
-
Sample
230608-f5kmdsdb2z
-
MD5
86fb6ae7a9a2286e3e584a7c1b63b349
-
SHA1
cb4a277f08253c931609566c56412a2470decf0c
-
SHA256
4fee34e10f0bccfb036b49df34b7e2ac9029edc57a6e34433a4d004dc737e974
-
SHA512
2a59707cc71b1e81763f14dd911c2a24132a318da40ea2cdffe75e21cd29d8820843cf8a38b4247e62daa91a4da3efc51b6259b9359d6f6dabc96bf39f503803
-
SSDEEP
12288:uMrby90UuDiCrPPMgPkiXSCktbEAPkUNiKSramG08lmP5bjbrnGBeU0vgfIugFE3:FyfqiCr8gPNi7wAPkdraL08lmRnGcvgF
Static task
static1
Behavioral task
behavioral1
Sample
4fee34e10f0bccfb036b49df34b7e2ac9029edc57a6e34433a4d004dc737e974.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.129:19068
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
4fee34e10f0bccfb036b49df34b7e2ac9029edc57a6e34433a4d004dc737e974
-
Size
753KB
-
MD5
86fb6ae7a9a2286e3e584a7c1b63b349
-
SHA1
cb4a277f08253c931609566c56412a2470decf0c
-
SHA256
4fee34e10f0bccfb036b49df34b7e2ac9029edc57a6e34433a4d004dc737e974
-
SHA512
2a59707cc71b1e81763f14dd911c2a24132a318da40ea2cdffe75e21cd29d8820843cf8a38b4247e62daa91a4da3efc51b6259b9359d6f6dabc96bf39f503803
-
SSDEEP
12288:uMrby90UuDiCrPPMgPkiXSCktbEAPkUNiKSramG08lmP5bjbrnGBeU0vgfIugFE3:FyfqiCr8gPNi7wAPkdraL08lmRnGcvgF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-