General
-
Target
9c4db5922d7bfe109615ba3a7404588c4d0c700911440b790a5732bab7418638
-
Size
771KB
-
Sample
230608-ryhp1aga92
-
MD5
d355ef21b34bb16e69db4b1f56b804ed
-
SHA1
464066933b8953d4b2df8ed936b17279b4f15b7a
-
SHA256
9c4db5922d7bfe109615ba3a7404588c4d0c700911440b790a5732bab7418638
-
SHA512
8d66cfe7566f35382aa00f18158e150add174dcdb5207462279b4736979b6cfdfd0b80bd0f9f2bcfc6c1dcb2ebd57d4f559eab45df40b1a68861e7e933e90d86
-
SSDEEP
12288:EMr/y90OEjN3OlvMeN14+G1PX+R3cKx22MCGtqpoeL/SjMh5vhi5r1GplI3WgoXP:TyhEUxMSmN+rx5aknLagTY/AlIm3/
Static task
static1
Behavioral task
behavioral1
Sample
9c4db5922d7bfe109615ba3a7404588c4d0c700911440b790a5732bab7418638.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.129:19068
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
9c4db5922d7bfe109615ba3a7404588c4d0c700911440b790a5732bab7418638
-
Size
771KB
-
MD5
d355ef21b34bb16e69db4b1f56b804ed
-
SHA1
464066933b8953d4b2df8ed936b17279b4f15b7a
-
SHA256
9c4db5922d7bfe109615ba3a7404588c4d0c700911440b790a5732bab7418638
-
SHA512
8d66cfe7566f35382aa00f18158e150add174dcdb5207462279b4736979b6cfdfd0b80bd0f9f2bcfc6c1dcb2ebd57d4f559eab45df40b1a68861e7e933e90d86
-
SSDEEP
12288:EMr/y90OEjN3OlvMeN14+G1PX+R3cKx22MCGtqpoeL/SjMh5vhi5r1GplI3WgoXP:TyhEUxMSmN+rx5aknLagTY/AlIm3/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-