General
-
Target
b25c4c1635384ea4f499c700ba5e0fb57b1c0c1cff4d7bb86c60add4daa61118
-
Size
763KB
-
Sample
230609-fezcvsba38
-
MD5
572f8be36ba2d9a97f3696e7eeb7a67a
-
SHA1
61a7e834ef1e995ff08ba4f5c25978a87f0ee731
-
SHA256
b25c4c1635384ea4f499c700ba5e0fb57b1c0c1cff4d7bb86c60add4daa61118
-
SHA512
b08110cb24cd3b6cb30165f56a96639d8735bd269ac2c63494cecd32faa0088e7729cc673b0b8916888d57091a856d90afa940d0c56dee7cfbce7bbf9e3e726d
-
SSDEEP
12288:pMrCy90cbqU4jROmJ4TURctkX524t/C15XzwXaFtTGC4Hu0Kt:byKGT0/p24hCfXUX8j0A
Static task
static1
Behavioral task
behavioral1
Sample
b25c4c1635384ea4f499c700ba5e0fb57b1c0c1cff4d7bb86c60add4daa61118.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b25c4c1635384ea4f499c700ba5e0fb57b1c0c1cff4d7bb86c60add4daa61118.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
duha
83.97.73.129:19068
-
auth_value
aafe99874c3b8854069470882e00246c
Extracted
amadey
3.83
77.91.68.30/music/rock/index.php
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
b25c4c1635384ea4f499c700ba5e0fb57b1c0c1cff4d7bb86c60add4daa61118
-
Size
763KB
-
MD5
572f8be36ba2d9a97f3696e7eeb7a67a
-
SHA1
61a7e834ef1e995ff08ba4f5c25978a87f0ee731
-
SHA256
b25c4c1635384ea4f499c700ba5e0fb57b1c0c1cff4d7bb86c60add4daa61118
-
SHA512
b08110cb24cd3b6cb30165f56a96639d8735bd269ac2c63494cecd32faa0088e7729cc673b0b8916888d57091a856d90afa940d0c56dee7cfbce7bbf9e3e726d
-
SSDEEP
12288:pMrCy90cbqU4jROmJ4TURctkX524t/C15XzwXaFtTGC4Hu0Kt:byKGT0/p24hCfXUX8j0A
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-