General
-
Target
R-Unlocker.exe
-
Size
275KB
-
Sample
230702-nsdbjsce3w
-
MD5
410ed841062196658dd64c3f86b30e23
-
SHA1
347d3c905b966350034982c3867d9916d4b6ce1a
-
SHA256
913451816ee934f6d27f4c6eea7cbe899fd95f2b8c85c5fabeca949dd21e8963
-
SHA512
1d1cefec4ad2d68d534efc7c4e56ed969ea4a57c7c5d02aa73af91e1097ba70463f6c357d76688b47524763501fe9b447772ca95343278f5a6fcc2a304421384
-
SSDEEP
3072:s3YUAcjp1MkkN0kDyNIvapYENPNQ1L4yXyiPh2ypr5y336YnDzHeWRQx2WR3xr:SXMkkN0DbYgNQSyXDc20Hh+QdQZ
Static task
static1
Behavioral task
behavioral1
Sample
R-Unlocker.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
R-Unlocker.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
redline
@basketball_nogoi_na_nahui
94.142.138.4:80
-
auth_value
29d6a68320aef07ed71416abb3302143
Extracted
laplas
http://185.209.161.189
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
R-Unlocker.exe
-
Size
275KB
-
MD5
410ed841062196658dd64c3f86b30e23
-
SHA1
347d3c905b966350034982c3867d9916d4b6ce1a
-
SHA256
913451816ee934f6d27f4c6eea7cbe899fd95f2b8c85c5fabeca949dd21e8963
-
SHA512
1d1cefec4ad2d68d534efc7c4e56ed969ea4a57c7c5d02aa73af91e1097ba70463f6c357d76688b47524763501fe9b447772ca95343278f5a6fcc2a304421384
-
SSDEEP
3072:s3YUAcjp1MkkN0kDyNIvapYENPNQ1L4yXyiPh2ypr5y336YnDzHeWRQx2WR3xr:SXMkkN0DbYgNQSyXDc20Hh+QdQZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-