General
-
Target
3606978ffff3d2e55d94f7dc3ff74193a81dce04f2a9d6a54481714aa13902c8
-
Size
769KB
-
Sample
230608-ql155sff38
-
MD5
e04ee94cb67ff26bfc0ebce4e07451b2
-
SHA1
8ea43e82e3f234c33320fe78102720dcd977bc46
-
SHA256
3606978ffff3d2e55d94f7dc3ff74193a81dce04f2a9d6a54481714aa13902c8
-
SHA512
729b132d9e853111716234d988533100325cc2bb05308d1d8b3e510be6aed6ad252e290ac2b58642b1f22b6f2ef22e63033f7bede6dd454d5827b7c557a1f956
-
SSDEEP
12288:3MrXy90iZAFJzjcjuHbt7+ibp5HwKMM4210pe6g3zyP7D6cSrUs:cygJEj6t7vbHwY10pYI7DMUs
Static task
static1
Behavioral task
behavioral1
Sample
3606978ffff3d2e55d94f7dc3ff74193a81dce04f2a9d6a54481714aa13902c8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.129:19068
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
3606978ffff3d2e55d94f7dc3ff74193a81dce04f2a9d6a54481714aa13902c8
-
Size
769KB
-
MD5
e04ee94cb67ff26bfc0ebce4e07451b2
-
SHA1
8ea43e82e3f234c33320fe78102720dcd977bc46
-
SHA256
3606978ffff3d2e55d94f7dc3ff74193a81dce04f2a9d6a54481714aa13902c8
-
SHA512
729b132d9e853111716234d988533100325cc2bb05308d1d8b3e510be6aed6ad252e290ac2b58642b1f22b6f2ef22e63033f7bede6dd454d5827b7c557a1f956
-
SSDEEP
12288:3MrXy90iZAFJzjcjuHbt7+ibp5HwKMM4210pe6g3zyP7D6cSrUs:cygJEj6t7vbHwY10pYI7DMUs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-