General
-
Target
5ce4f29786490884de8ff50e887a3fb91267d93a1408745fc2f8f7a0c036a8b4
-
Size
770KB
-
Sample
230608-r7g5tsgh6s
-
MD5
5f531e370db582bbd71e8eb1a998a4a8
-
SHA1
28729b19e7803eb5270e27b233f77ef3e700dc41
-
SHA256
5ce4f29786490884de8ff50e887a3fb91267d93a1408745fc2f8f7a0c036a8b4
-
SHA512
d80e76a37dca5f63d693c05c5dfc7d4094e5dfbfac9082bcaca5f618ad902c314a705a8acc4e89f1c7a673e4d1ee2461edf8127c29512aa866364c5fa8a0c70f
-
SSDEEP
12288:uMrLy90MUuLlxq7wWz2CcAPZFdMtx3JVFeRcaT313jsVrXAeHzA7JdhZDdQdT:9y/UgU2NARY5VFgcOl3jsV5HoJdHI
Static task
static1
Behavioral task
behavioral1
Sample
5ce4f29786490884de8ff50e887a3fb91267d93a1408745fc2f8f7a0c036a8b4.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
maxi
83.97.73.129:19068
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
5ce4f29786490884de8ff50e887a3fb91267d93a1408745fc2f8f7a0c036a8b4
-
Size
770KB
-
MD5
5f531e370db582bbd71e8eb1a998a4a8
-
SHA1
28729b19e7803eb5270e27b233f77ef3e700dc41
-
SHA256
5ce4f29786490884de8ff50e887a3fb91267d93a1408745fc2f8f7a0c036a8b4
-
SHA512
d80e76a37dca5f63d693c05c5dfc7d4094e5dfbfac9082bcaca5f618ad902c314a705a8acc4e89f1c7a673e4d1ee2461edf8127c29512aa866364c5fa8a0c70f
-
SSDEEP
12288:uMrLy90MUuLlxq7wWz2CcAPZFdMtx3JVFeRcaT313jsVrXAeHzA7JdhZDdQdT:9y/UgU2NARY5VFgcOl3jsV5HoJdHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-