General
-
Target
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d.zip
-
Size
1.6MB
-
Sample
240402-qbgnraag86
-
MD5
0948c02b04a5f5c1339e4e19af3860de
-
SHA1
4d779c5b4dd21ef17a73198596ed174dafe95c2a
-
SHA256
be03e891a52373d5c6f06c6826404f5564dcb1a4981f48f6ad082269dabe149d
-
SHA512
f0a92a88a821d4e622e2f1dab72b4a45ce7cb2099038ebf433f6712f000aa2efa94f2b0499c8b4c76b6af6846721c93193cdb1ef27230d87bda59ad5651cd184
-
SSDEEP
49152:vfeOGtGq7vlSNVAhdWY5dM3Qo36DClfEGhD:vMtreqhdWYPoQRcEoD
Static task
static1
Behavioral task
behavioral1
Sample
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d.exe
Resource
win7-20240220-en
Malware Config
Extracted
redline
1
77.221.156.45:18734
Targets
-
-
Target
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d.exe
-
Size
1.9MB
-
MD5
1a933b075452db624a756f76662a0614
-
SHA1
264bedf3867851461ea52b75650f414fcebb61ef
-
SHA256
679d5cdadcc48fa79574ce12e8d0fd2e19823dc4b7e39a84b5b286672f45a72d
-
SHA512
8f84c2c548d5774c5e942cef1dc5e0eb6e82a79d22a30b636bf0a98fad535cfab5e77a380c1c167ea33caca1ee397e64490eff0672cc915d1c8e797eb63e1071
-
SSDEEP
24576:GubsnafAPyjSzuubsnafAPyjZrilCQZCC3kmnrAa1rmqUeIiVfox2oTVZHeBFpUH:YI4wI1iln73XnrA0dqiFoHcpfi/Znqh0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-