General
-
Target
9623ebe56f6e271566e80c3ecd83d534ae25837b1c8727da91b4b8a92c95c41f
-
Size
770KB
-
Sample
230608-rqgsqsgg4t
-
MD5
7c3fd017539d6b8f7091a047fba2424d
-
SHA1
eade2084e702b838891cfd17bd12153858bb1f76
-
SHA256
9623ebe56f6e271566e80c3ecd83d534ae25837b1c8727da91b4b8a92c95c41f
-
SHA512
054b39d89933956f31036c5d563ca36a67278af67a0102d68b3c86eff2389df24163bcbbf7726653e997fdca9b6f2ea8ac26fe84651cba316b9617e38f9fa7cb
-
SSDEEP
12288:yMrzy90s1JBa5jzbJJAapvMPj3rPZNiHLLBEw6r5Lk9b3LkGicD0GizOjH+G:Nyn7eTTAaBM/6Zm5Lqb3LppJ
Static task
static1
Behavioral task
behavioral1
Sample
9623ebe56f6e271566e80c3ecd83d534ae25837b1c8727da91b4b8a92c95c41f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.129:19068
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
9623ebe56f6e271566e80c3ecd83d534ae25837b1c8727da91b4b8a92c95c41f
-
Size
770KB
-
MD5
7c3fd017539d6b8f7091a047fba2424d
-
SHA1
eade2084e702b838891cfd17bd12153858bb1f76
-
SHA256
9623ebe56f6e271566e80c3ecd83d534ae25837b1c8727da91b4b8a92c95c41f
-
SHA512
054b39d89933956f31036c5d563ca36a67278af67a0102d68b3c86eff2389df24163bcbbf7726653e997fdca9b6f2ea8ac26fe84651cba316b9617e38f9fa7cb
-
SSDEEP
12288:yMrzy90s1JBa5jzbJJAapvMPj3rPZNiHLLBEw6r5Lk9b3LkGicD0GizOjH+G:Nyn7eTTAaBM/6Zm5Lqb3LppJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-