General
-
Target
file.exe
-
Size
601KB
-
Sample
230609-azma5sbc31
-
MD5
4a9d0e906c3a8882d7b7775de3c5533c
-
SHA1
e098c76fca0eb02e6153a0a03267e8aed67db80a
-
SHA256
3776ac0f25def18aa1d95847aea747346f49f5819c498fe97c906e9695950b73
-
SHA512
7792089157eefa0fd42a2f6af5bb7328b3aff763a1da0e41a47ffce56b28caaf1544271608796a96cdcefd6db27e0fd1d96a1a79e06e1221c7409d8d1aba7c8b
-
SSDEEP
12288:QMr9y90cJBE8i+SxdGhFEYVus4lUcKBGbjY4ljHqP/V34:9yb3NSxdQ3VusCCGLE34
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
duha
83.97.73.129:19068
-
auth_value
aafe99874c3b8854069470882e00246c
Extracted
amadey
3.83
77.91.68.30/music/rock/index.php
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
file.exe
-
Size
601KB
-
MD5
4a9d0e906c3a8882d7b7775de3c5533c
-
SHA1
e098c76fca0eb02e6153a0a03267e8aed67db80a
-
SHA256
3776ac0f25def18aa1d95847aea747346f49f5819c498fe97c906e9695950b73
-
SHA512
7792089157eefa0fd42a2f6af5bb7328b3aff763a1da0e41a47ffce56b28caaf1544271608796a96cdcefd6db27e0fd1d96a1a79e06e1221c7409d8d1aba7c8b
-
SSDEEP
12288:QMr9y90cJBE8i+SxdGhFEYVus4lUcKBGbjY4ljHqP/V34:9yb3NSxdQ3VusCCGLE34
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-