General
-
Target
04aa05a9a637cdc44240c6e1c.bin
-
Size
120KB
-
Sample
230701-g4tz4sgf9v
-
MD5
fda4c06d83d0f7fc817fa5f4b9c41612
-
SHA1
a9f3eece5248736e705d15c568c4d2e7a47a35da
-
SHA256
cd347e4db6d5d3d74dbe81b6a190c35d67a146d2acbf85f0d6deb4e4eb6e3955
-
SHA512
19ee3d999a8b42fdac04d6d50ea9c6bcf1df89916fe4adc8036170128f017e2367f5e4c013099a88d2ee561d401d2a1a82289c25b64d2a9eee0a91bd814de574
-
SSDEEP
3072:+XIg7DrhIgMFHAxdwB5A7rSeQZqa2TBfAfZM/A95Ko7H:+F7DlNOGdw2SeQX2K2/4n
Static task
static1
Behavioral task
behavioral1
Sample
4c5c389d0f6cbdaf6fd89585559d71a37e061e7678aa1a5391d82657f8890569.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
4c5c389d0f6cbdaf6fd89585559d71a37e061e7678aa1a5391d82657f8890569.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
redline
@ididjsjsid
94.142.138.4:80
-
auth_value
ff1308093e68aa6b7353aa8595fa3e75
Extracted
laplas
http://185.209.161.189
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
4c5c389d0f6cbdaf6fd89585559d71a37e061e7678aa1a5391d82657f8890569.exe
-
Size
274KB
-
MD5
04aa05a9a637cdc44240c6e1cda33acc
-
SHA1
21c383fc380f4a523ff90398396ad97fe31f376a
-
SHA256
4c5c389d0f6cbdaf6fd89585559d71a37e061e7678aa1a5391d82657f8890569
-
SHA512
8ed6f4e78ce6f45db49706a5d5a42bb3237bab9741f4deadaf10a51d7bf1dbbe5292a0d9307b508f3a4c873b41fa2fe18ea5859a8eeb6b39ac95044ba4c29fd5
-
SSDEEP
6144:21ea2GMpEl3Zcsmci25sndkzOYFwKBbvoEjypFm6QIBJ7ZuSyY80ZUE4UIn8zpF7:7a2GMpwbyLm6QIDZunYt2jUo8VFeixIA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-