General
-
Target
a8c1c8f015b17efaa454a30f94634177.bin
-
Size
976KB
-
Sample
240624-drrsfazalp
-
MD5
32aab8a27156369f2876068b0080b388
-
SHA1
2fe7b9ebe90b5899459fb0a3c34706aa81a4803d
-
SHA256
dacc9d9d0b7280b3c5fad7f9884689996f5dc00d2701c8f2af5d0558b0d41982
-
SHA512
d16b093f686cc16a28a31ca948503063a5ea94d6a9829f44d75d23f1fa75112792af4971893c210967cef5dda45cc8e1db9ca5f03d70f9e89a8aae07940004c9
-
SSDEEP
24576:AqIrV37h2S/I4mm8qLmkG4RLt+qcpghqjcnnRszX1JSxB7zU1bvAm:sbDmmx6kJRhPO6p/MbvAm
Static task
static1
Behavioral task
behavioral1
Sample
383734f46f2f29f9111af90cdf9dc3b3e6ea2e23e238a235f46fe487db8cada6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
383734f46f2f29f9111af90cdf9dc3b3e6ea2e23e238a235f46fe487db8cada6.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
@DolphinLoader_Bot
157.90.5.250:18637
Targets
-
-
Target
383734f46f2f29f9111af90cdf9dc3b3e6ea2e23e238a235f46fe487db8cada6.exe
-
Size
1.0MB
-
MD5
a8c1c8f015b17efaa454a30f94634177
-
SHA1
416bacd4cbf6e717ff02d06f92be0586dec5f5fe
-
SHA256
383734f46f2f29f9111af90cdf9dc3b3e6ea2e23e238a235f46fe487db8cada6
-
SHA512
6a456e2d7f7d84c4dc21bed1f49312140ce01e99dbb922c26366784fb1a24ae43febad099ecd75858641e71b33dc50360315de074f1906a4a94e0ef51b18e4db
-
SSDEEP
24576:2JYqTardgOFZz+7N/fcyFGUuCNgvmY4ul8GGQwtDtH4+i+CTjoIBsZTOT:EPqbz+7BfcypgeKl5GHDYBtBsROT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-