General
-
Target
01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318
-
Size
771KB
-
Sample
230608-s6dlpage74
-
MD5
6164ad0bb84df816d4b7e5476a4e8258
-
SHA1
b604062ee830e422e2f92715ff2d93a1e8fc9b5d
-
SHA256
01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318
-
SHA512
682e299e37400a868bdca12299dc8db194f733353f2bc03a3558499177713350b76566e79a1bf3f6f97c541a5507c1edff26c6459b260cebe0ddf5450765bcc2
-
SSDEEP
12288:UMrHy90x9JGKJRGArxJNY8no3m/+yK8MyfciIrtK9vzLj/8/Hm265W3:ryA7xKArQ3dyZZc9rtIb8/mHW3
Static task
static1
Behavioral task
behavioral1
Sample
01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
muha
83.97.73.129:19068
-
auth_value
3c237e5fecb41481b7af249e79828a46
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318
-
Size
771KB
-
MD5
6164ad0bb84df816d4b7e5476a4e8258
-
SHA1
b604062ee830e422e2f92715ff2d93a1e8fc9b5d
-
SHA256
01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318
-
SHA512
682e299e37400a868bdca12299dc8db194f733353f2bc03a3558499177713350b76566e79a1bf3f6f97c541a5507c1edff26c6459b260cebe0ddf5450765bcc2
-
SSDEEP
12288:UMrHy90x9JGKJRGArxJNY8no3m/+yK8MyfciIrtK9vzLj/8/Hm265W3:ryA7xKArQ3dyZZc9rtIb8/mHW3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-