General
-
Target
installer.zip
-
Size
1.5MB
-
Sample
230706-qzl85sbg64
-
MD5
98a2b3e1a3ffe6bf93e15f580b8a0172
-
SHA1
d4100db083f42a3e4d872c52e2409ebb66382505
-
SHA256
6245c07bf0750103927e9040861ef8b7dd5542d0e58bf5224830d2da89da391f
-
SHA512
63df92f9d69a470834e11b337bbc85fa033a5c92c4a9c7a0fd2dcce90c03cfef03ce39cb7e1062b10f7a0b81abfe559bfe9b8124c3bb7771886a3e3da8d17720
-
SSDEEP
49152:RubvnOfAShPr98xN4ACTXtoGj72uk3l9Yvxrs:gbPOfAShPr9874dWY72ui6o
Static task
static1
Behavioral task
behavioral1
Sample
installer.zip
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
@hddwet
94.142.138.4:80
-
auth_value
7ea037c98a7d3534ffcae43a97e29278
Extracted
redline
0407
89.23.96.198:24230
-
auth_value
09f9c337ba96f35d1b35a378ca190d67
Extracted
laplas
http://185.209.161.189
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
installer.zip
-
Size
1.5MB
-
MD5
98a2b3e1a3ffe6bf93e15f580b8a0172
-
SHA1
d4100db083f42a3e4d872c52e2409ebb66382505
-
SHA256
6245c07bf0750103927e9040861ef8b7dd5542d0e58bf5224830d2da89da391f
-
SHA512
63df92f9d69a470834e11b337bbc85fa033a5c92c4a9c7a0fd2dcce90c03cfef03ce39cb7e1062b10f7a0b81abfe559bfe9b8124c3bb7771886a3e3da8d17720
-
SSDEEP
49152:RubvnOfAShPr98xN4ACTXtoGj72uk3l9Yvxrs:gbPOfAShPr9874dWY72ui6o
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-