General
-
Target
757e8f8597d5ccee67ad3f1e48a2adf371f26ae1720013052ece0ea1adea4dd8
-
Size
764KB
-
Sample
230608-nq3hnafe9t
-
MD5
c5f101f93e02c2b978685b69061470a6
-
SHA1
5ec41ad3f2943b605f9c216063ffc8fd1b11f5c6
-
SHA256
757e8f8597d5ccee67ad3f1e48a2adf371f26ae1720013052ece0ea1adea4dd8
-
SHA512
3eb0794595c8810a5f8a4eabd8515227b59ce7a9b5c707d513549af4625152fd22d29e157900e15d9821ecfbf85d87637ab0499174766884a3a2633f81a1105b
-
SSDEEP
12288:oMrIy906V3eCV48VcG2wy/9bagQMlvpEaBeIK6OIxzyh+iPxG5lFh:gy3NcIO9baevp9en6Omzyh+i5ilFh
Static task
static1
Behavioral task
behavioral1
Sample
757e8f8597d5ccee67ad3f1e48a2adf371f26ae1720013052ece0ea1adea4dd8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.129:19068
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
757e8f8597d5ccee67ad3f1e48a2adf371f26ae1720013052ece0ea1adea4dd8
-
Size
764KB
-
MD5
c5f101f93e02c2b978685b69061470a6
-
SHA1
5ec41ad3f2943b605f9c216063ffc8fd1b11f5c6
-
SHA256
757e8f8597d5ccee67ad3f1e48a2adf371f26ae1720013052ece0ea1adea4dd8
-
SHA512
3eb0794595c8810a5f8a4eabd8515227b59ce7a9b5c707d513549af4625152fd22d29e157900e15d9821ecfbf85d87637ab0499174766884a3a2633f81a1105b
-
SSDEEP
12288:oMrIy906V3eCV48VcG2wy/9bagQMlvpEaBeIK6OIxzyh+iPxG5lFh:gy3NcIO9baevp9en6Omzyh+i5ilFh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-