General
-
Target
tmp
-
Size
589KB
-
Sample
230609-jkg8bacc3v
-
MD5
80b6df127cec34f42e94eb78941e80dc
-
SHA1
1e319039642308ecaedcbbe296f7b5e56e2d42dd
-
SHA256
49301f7cefccb27d37a5e66197ac8970e753ef82f1be7a2c5e128996fa6e9c1e
-
SHA512
5f74d18b1729407c39300e1925cdf82bd0032acf92adad884956065bbd03aaae3fd4a6a15ce001365624dc4e8a1eb8a306381aaa604e8b68bc4c3cd6ef936d69
-
SSDEEP
12288:yMr+y90MeCx1TXj0N7c69WCB46t0CUBpOEdtK3AQEWNj:Ay/x1TTK7V9Xa6iCA5zUNj
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
duha
83.97.73.129:19068
-
auth_value
aafe99874c3b8854069470882e00246c
Extracted
amadey
3.83
77.91.68.30/music/rock/index.php
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
tmp
-
Size
589KB
-
MD5
80b6df127cec34f42e94eb78941e80dc
-
SHA1
1e319039642308ecaedcbbe296f7b5e56e2d42dd
-
SHA256
49301f7cefccb27d37a5e66197ac8970e753ef82f1be7a2c5e128996fa6e9c1e
-
SHA512
5f74d18b1729407c39300e1925cdf82bd0032acf92adad884956065bbd03aaae3fd4a6a15ce001365624dc4e8a1eb8a306381aaa604e8b68bc4c3cd6ef936d69
-
SSDEEP
12288:yMr+y90MeCx1TXj0N7c69WCB46t0CUBpOEdtK3AQEWNj:Ay/x1TTK7V9Xa6iCA5zUNj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-