General
-
Target
4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b
-
Size
771KB
-
Sample
230608-v94cmahc26
-
MD5
8db6ab1c46a1cb2268fd630113553ca2
-
SHA1
8e724a969fae1487821b7258287b5b77cc273886
-
SHA256
4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b
-
SHA512
8f8c155c8cb6935c3249778d885b2b4d3beee81a1e35d1763decc425059d7a0af4bd0e535ad36b0768f052938218fc8b29e23f1f5d822526c40f3c1498bc96e2
-
SSDEEP
24576:Py7jL2N2hR5o4TmQX0y2WLzqiz0bGZtJ:aKN2rTmQX0WLz9z0GZ
Static task
static1
Behavioral task
behavioral1
Sample
4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
duha
83.97.73.129:19068
-
auth_value
aafe99874c3b8854069470882e00246c
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b
-
Size
771KB
-
MD5
8db6ab1c46a1cb2268fd630113553ca2
-
SHA1
8e724a969fae1487821b7258287b5b77cc273886
-
SHA256
4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b
-
SHA512
8f8c155c8cb6935c3249778d885b2b4d3beee81a1e35d1763decc425059d7a0af4bd0e535ad36b0768f052938218fc8b29e23f1f5d822526c40f3c1498bc96e2
-
SSDEEP
24576:Py7jL2N2hR5o4TmQX0y2WLzqiz0bGZtJ:aKN2rTmQX0WLz9z0GZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-