General
-
Target
.rar
-
Size
3.1MB
-
Sample
230706-vdd3vsec9t
-
MD5
353c10b3f0586b250b9b1e8fb150d1b9
-
SHA1
ce21a8679af6ff535ca77cf8bf3b8ba9adafad89
-
SHA256
bae427e9391d1bc744b12cb517ca67a2becd386d4b61dab7eff043b33960b8cc
-
SHA512
b6552d46a827c85c2318fdeedc35ded72c2f56db96b74ff2600faa69fea02c2fad895c24242b8a260eafd12e85e409eaf4b807161db4f05aa3a47c3bb7001739
-
SSDEEP
98304:hhAYiU8zd95AX3j+GqSrfzrKUMcZ1E42MRLG:hz8zD5sLprfz2UdZ1EhaG
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
@kkkllsttnnn
94.142.138.4:80
-
auth_value
c82524415ee633c9f508c7d4bf1d0d29
Extracted
laplas
http://185.209.161.189
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Targets
-
-
Target
Setup.exe
-
Size
1.1MB
-
MD5
18e79403815bcb2831d9383c9135edbf
-
SHA1
cd49506de380658119a1fff1745a98316152f9e6
-
SHA256
15dc5f309732a5d78c6f0ad0bb77baea4f6dbab4ce7d7bcad655c2ceb6de06fa
-
SHA512
3a0f2fe4e5445ba0e633da5b3c7832e4af4e2de907a81b0d05cfbf348a41404a83682db86710825215bbfed96cb49ef2e594f973bf37a8abfc499039b1e8e7bb
-
SSDEEP
6144:9hvWGad/1VqBFJlXdvaIBNJtJSeAOagS5pUGtiHjzk1In/yP3:jG/1VqBfdSedSYGszI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-