General
-
Target
file.exe
-
Size
670KB
-
Sample
230609-aygdhaae58
-
MD5
dd85106e003673b034347fe3e4ebdc5d
-
SHA1
8ccbfbb9d5c3d4e53acb82168eb650de6a481379
-
SHA256
e96dd0b309b24dcd980fd017ed7190631541e1c2190a5a428d1ee456d1e18f2f
-
SHA512
dfbc921ca2469666f4501d67b4dc9696e444a2901403ba36701b1144e09ab4d09bcdb366f9d9c17e7842afff9c29480386960da6482df1c0750c87d1f802f537
-
SSDEEP
12288:JMrxy90NmceAEvH4XlOz+RVtjbAs9sVE7BJcmuUDUMEyqJVdl/GgoBt:Yy9c0AgzmjDsVE7U+rMdldIt
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
muha
83.97.73.129:19068
-
auth_value
3c237e5fecb41481b7af249e79828a46
Extracted
amadey
3.83
77.91.68.30/music/rock/index.php
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
file.exe
-
Size
670KB
-
MD5
dd85106e003673b034347fe3e4ebdc5d
-
SHA1
8ccbfbb9d5c3d4e53acb82168eb650de6a481379
-
SHA256
e96dd0b309b24dcd980fd017ed7190631541e1c2190a5a428d1ee456d1e18f2f
-
SHA512
dfbc921ca2469666f4501d67b4dc9696e444a2901403ba36701b1144e09ab4d09bcdb366f9d9c17e7842afff9c29480386960da6482df1c0750c87d1f802f537
-
SSDEEP
12288:JMrxy90NmceAEvH4XlOz+RVtjbAs9sVE7BJcmuUDUMEyqJVdl/GgoBt:Yy9c0AgzmjDsVE7U+rMdldIt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-