General
-
Target
96fe96ce3b2f22ef133ae448f62c1dfff6f8eb474108b31be9e50e188b48c2d6
-
Size
600KB
-
Sample
230608-v3fmzsaa2t
-
MD5
ee51d1c855c21e5434e0ec1b6959ca65
-
SHA1
58eeb9f603a2af19959085d60c6ee6e66ebac399
-
SHA256
96fe96ce3b2f22ef133ae448f62c1dfff6f8eb474108b31be9e50e188b48c2d6
-
SHA512
eab4d62e3164166f20f5c605cbad7cba5c2b8b39353a8cd8ab9e9d494c28bda012250fdf98c941de2112ee33d1338a861b7a86c123534d403de00322c7ebe92f
-
SSDEEP
12288:NMr1y90dvDLtGU8YxJ6HaDOpMt+3HjVmzGvL9CE1JAZ+A9v:UygrLtTW6DOqt+3Hw6CE1pA9v
Static task
static1
Behavioral task
behavioral1
Sample
96fe96ce3b2f22ef133ae448f62c1dfff6f8eb474108b31be9e50e188b48c2d6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
duha
83.97.73.129:19068
-
auth_value
aafe99874c3b8854069470882e00246c
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
96fe96ce3b2f22ef133ae448f62c1dfff6f8eb474108b31be9e50e188b48c2d6
-
Size
600KB
-
MD5
ee51d1c855c21e5434e0ec1b6959ca65
-
SHA1
58eeb9f603a2af19959085d60c6ee6e66ebac399
-
SHA256
96fe96ce3b2f22ef133ae448f62c1dfff6f8eb474108b31be9e50e188b48c2d6
-
SHA512
eab4d62e3164166f20f5c605cbad7cba5c2b8b39353a8cd8ab9e9d494c28bda012250fdf98c941de2112ee33d1338a861b7a86c123534d403de00322c7ebe92f
-
SSDEEP
12288:NMr1y90dvDLtGU8YxJ6HaDOpMt+3HjVmzGvL9CE1JAZ+A9v:UygrLtTW6DOqt+3Hw6CE1pA9v
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-