General
-
Target
1fd972fa7b5d9b8b1457dd025aa1ffe7.exe
-
Size
25.6MB
-
Sample
230720-j1jq3sdf84
-
MD5
1fd972fa7b5d9b8b1457dd025aa1ffe7
-
SHA1
2879d38e0b6fe1b930fafbe6415b641b5efc68e4
-
SHA256
520044b6e34ca534c0a4d97abd318a8db37169f18f8c1e385f3d5b79df9d025d
-
SHA512
9f5869d6e6ae67559f5a82d0841307ac1b6d09946c5ba963964d6a01e1c9aa17a229bfe30ec67e72c7f514e21c585c8ad1369bb6100d1aa16de3f829e7f527e1
-
SSDEEP
98304:ylQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxI:uQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRp
Behavioral task
behavioral1
Sample
1fd972fa7b5d9b8b1457dd025aa1ffe7.exe
Resource
win7-20230712-en
Malware Config
Extracted
redline
LXIX
5.35.33.167:17154
-
auth_value
3f30d9c8480a0830cfcc9a091fac5fca
Targets
-
-
Target
1fd972fa7b5d9b8b1457dd025aa1ffe7.exe
-
Size
25.6MB
-
MD5
1fd972fa7b5d9b8b1457dd025aa1ffe7
-
SHA1
2879d38e0b6fe1b930fafbe6415b641b5efc68e4
-
SHA256
520044b6e34ca534c0a4d97abd318a8db37169f18f8c1e385f3d5b79df9d025d
-
SHA512
9f5869d6e6ae67559f5a82d0841307ac1b6d09946c5ba963964d6a01e1c9aa17a229bfe30ec67e72c7f514e21c585c8ad1369bb6100d1aa16de3f829e7f527e1
-
SSDEEP
98304:ylQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxI:uQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Shurk Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-