General
-
Target
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d.zip
-
Size
1.6MB
-
Sample
240402-lt379adf33
-
MD5
53dc2a55433552efc774b1c2bead4929
-
SHA1
7e247aafb9a4ac439d4d6d6e08f59d19616cfa9d
-
SHA256
f7a29bebd639285c6c3fe02e8c73d0ca8859efa5c28edfef72599d488be56df9
-
SHA512
5f0e3f6d822766260c053bfe8774dcdfb50a763298de498836d541eaf632551e105a9039dadca15b34867bc45888de22ad7dee6cc8320c1cfdf956e751070cd5
-
SSDEEP
49152:8I7jW1mGnxFQOtw0jgR2FH9zcdwsOAagVOFtkE8n:TiXxntJsEFH9YdEA74kE8n
Static task
static1
Behavioral task
behavioral1
Sample
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d.exe
Resource
win7-20240221-en
Malware Config
Extracted
redline
1
77.221.156.45:18734
Targets
-
-
Target
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d.exe
-
Size
1.9MB
-
MD5
1a933b075452db624a756f76662a0614
-
SHA1
264bedf3867851461ea52b75650f414fcebb61ef
-
SHA256
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d
-
SHA512
8f84c2c548d5774c5e942cef1dc5e0eb6e82a79d22a30b636bf0a98fad535cfab5e77a380c1c167ea33caca1ee397e64490eff0672cc915d1c8e797eb63e1071
-
SSDEEP
24576:GubsnafAPyjSzuubsnafAPyjZrilCQZCC3kmnrAa1rmqUeIiVfox2oTVZHeBFpUH:YI4wI1iln73XnrA0dqiFoHcpfi/Znqh0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-