General
-
Target
98b492a295d98cbe237650e17dd89f6b50c6ace5e0bd0534cf3c60afe2d896c4
-
Size
771KB
-
Sample
230608-tyflrahe6t
-
MD5
0f1e0548178aa18d185e0e5d0f562da7
-
SHA1
50f063feed44579553b9cb9fb19316fd7d63ef44
-
SHA256
98b492a295d98cbe237650e17dd89f6b50c6ace5e0bd0534cf3c60afe2d896c4
-
SHA512
4784ea434762b50f3f54e941ec8e3c039ddf4e579473905980f6534706d1426006e832c4ac382cb3cb051504bcf6229edc47a87000fb0e68e3818e507faac334
-
SSDEEP
12288:mMr3y903Mkd/R7+E6VTQzqywGW1wBQfyIPEn6NQKkLyOljgAXz9+YYmjZ/zHsl:Ryrk/7+BQzqxGV9DKkLyyjgAXzIRmjM
Static task
static1
Behavioral task
behavioral1
Sample
98b492a295d98cbe237650e17dd89f6b50c6ace5e0bd0534cf3c60afe2d896c4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
muha
83.97.73.129:19068
-
auth_value
3c237e5fecb41481b7af249e79828a46
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
98b492a295d98cbe237650e17dd89f6b50c6ace5e0bd0534cf3c60afe2d896c4
-
Size
771KB
-
MD5
0f1e0548178aa18d185e0e5d0f562da7
-
SHA1
50f063feed44579553b9cb9fb19316fd7d63ef44
-
SHA256
98b492a295d98cbe237650e17dd89f6b50c6ace5e0bd0534cf3c60afe2d896c4
-
SHA512
4784ea434762b50f3f54e941ec8e3c039ddf4e579473905980f6534706d1426006e832c4ac382cb3cb051504bcf6229edc47a87000fb0e68e3818e507faac334
-
SSDEEP
12288:mMr3y903Mkd/R7+E6VTQzqywGW1wBQfyIPEn6NQKkLyOljgAXz9+YYmjZ/zHsl:Ryrk/7+BQzqxGV9DKkLyyjgAXzIRmjM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-