General
-
Target
e2de78061696bb682e439d1fc794e3c3b9a1be7fcd77a515dc18b16ccc1f5dd3
-
Size
770KB
-
Sample
230608-n5vrcsfg6v
-
MD5
1ba4346c5442b85f584e2a6ef342c3be
-
SHA1
9a1a48a65550ca8b0d735f5897b8fcdc88886cb6
-
SHA256
e2de78061696bb682e439d1fc794e3c3b9a1be7fcd77a515dc18b16ccc1f5dd3
-
SHA512
e253a224fdf47c57b268ac8caff6ce55bde1df4393152bbd6a12d7d975dae37fd319699541ca2c2ca1070a87d0eca1f30bf0afbb1386efd3e09dc9fdef60fbb0
-
SSDEEP
24576:7yUvqjvcxjBxcVoZbvZAYUUDP6wO4GDUiuyY5Ps:uUB8VSbrnD6P48E
Static task
static1
Behavioral task
behavioral1
Sample
e2de78061696bb682e439d1fc794e3c3b9a1be7fcd77a515dc18b16ccc1f5dd3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.129:19068
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
e2de78061696bb682e439d1fc794e3c3b9a1be7fcd77a515dc18b16ccc1f5dd3
-
Size
770KB
-
MD5
1ba4346c5442b85f584e2a6ef342c3be
-
SHA1
9a1a48a65550ca8b0d735f5897b8fcdc88886cb6
-
SHA256
e2de78061696bb682e439d1fc794e3c3b9a1be7fcd77a515dc18b16ccc1f5dd3
-
SHA512
e253a224fdf47c57b268ac8caff6ce55bde1df4393152bbd6a12d7d975dae37fd319699541ca2c2ca1070a87d0eca1f30bf0afbb1386efd3e09dc9fdef60fbb0
-
SSDEEP
24576:7yUvqjvcxjBxcVoZbvZAYUUDP6wO4GDUiuyY5Ps:uUB8VSbrnD6P48E
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-