General
-
Target
e648ea2ee0783f885064a6a3d85baf46f3967b4b5b063b224f3dae7d2fe309ee
-
Size
771KB
-
Sample
230608-sjxfaaha7z
-
MD5
702a512c7cc21d77f8d67ea744fbfe01
-
SHA1
c3ef13cd9ce230c042472c700430a6b166cc9229
-
SHA256
e648ea2ee0783f885064a6a3d85baf46f3967b4b5b063b224f3dae7d2fe309ee
-
SHA512
ba1aa95a69cc73b64648b1fe3d4c0ad8ae1b064bd95a5a1caefa3c36a7b636ff057745d4c6d4118cd85c57c81e4f41bf91465b55ef59941e49280e995535029c
-
SSDEEP
12288:rMrXy90kKl1ephg1PiNViET8zUD3t+sFjQ7tjf5oAEJzOA/TgGvfMoHcBLma:YylhgxgVdOK+sF07tjh23/TgRNX
Static task
static1
Behavioral task
behavioral1
Sample
e648ea2ee0783f885064a6a3d85baf46f3967b4b5b063b224f3dae7d2fe309ee.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.129:19068
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
e648ea2ee0783f885064a6a3d85baf46f3967b4b5b063b224f3dae7d2fe309ee
-
Size
771KB
-
MD5
702a512c7cc21d77f8d67ea744fbfe01
-
SHA1
c3ef13cd9ce230c042472c700430a6b166cc9229
-
SHA256
e648ea2ee0783f885064a6a3d85baf46f3967b4b5b063b224f3dae7d2fe309ee
-
SHA512
ba1aa95a69cc73b64648b1fe3d4c0ad8ae1b064bd95a5a1caefa3c36a7b636ff057745d4c6d4118cd85c57c81e4f41bf91465b55ef59941e49280e995535029c
-
SSDEEP
12288:rMrXy90kKl1ephg1PiNViET8zUD3t+sFjQ7tjf5oAEJzOA/TgGvfMoHcBLma:YylhgxgVdOK+sF07tjh23/TgRNX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-