General
-
Target
1b76ccded7e21cc81c82d211cfbde5a461ebf53d005cf1208088b3b5d42b8535
-
Size
767KB
-
Sample
230608-ky77bsdd77
-
MD5
a8c0a9b362ddff388fe3b2b536e812ff
-
SHA1
073c7ec3d8e23b073afc318f1820a1602866b743
-
SHA256
1b76ccded7e21cc81c82d211cfbde5a461ebf53d005cf1208088b3b5d42b8535
-
SHA512
f175d17f1c9925d0459681ad4e72df7c9e6d0de7eb5da553a40ff5242512c84db14bd1c8da623e83f8e8bb454bde3c20982694a66693559922a7d0d441151b9e
-
SSDEEP
12288:wMrzy90CSX+GrPb7oJTp1TAfbsDr3CgA1v0cpoR87A3/DPWEeHdAuj8B:Tyzk+0Pb7UzysfCgAdZoRkcDPfodf8B
Static task
static1
Behavioral task
behavioral1
Sample
1b76ccded7e21cc81c82d211cfbde5a461ebf53d005cf1208088b3b5d42b8535.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.129:19068
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
1b76ccded7e21cc81c82d211cfbde5a461ebf53d005cf1208088b3b5d42b8535
-
Size
767KB
-
MD5
a8c0a9b362ddff388fe3b2b536e812ff
-
SHA1
073c7ec3d8e23b073afc318f1820a1602866b743
-
SHA256
1b76ccded7e21cc81c82d211cfbde5a461ebf53d005cf1208088b3b5d42b8535
-
SHA512
f175d17f1c9925d0459681ad4e72df7c9e6d0de7eb5da553a40ff5242512c84db14bd1c8da623e83f8e8bb454bde3c20982694a66693559922a7d0d441151b9e
-
SSDEEP
12288:wMrzy90CSX+GrPb7oJTp1TAfbsDr3CgA1v0cpoR87A3/DPWEeHdAuj8B:Tyzk+0Pb7UzysfCgAdZoRkcDPfodf8B
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-