General
-
Target
1605b9356f18522e57c43efc975a5f798bf22c20e5d764bddd714a66a79bc5b0.exe
-
Size
3.0MB
-
Sample
240806-bn23wsydra
-
MD5
d3a8e596c0edc473d507bb8d08cda1a7
-
SHA1
531462e8b67d0752c1055498d3c514f3405a512b
-
SHA256
1605b9356f18522e57c43efc975a5f798bf22c20e5d764bddd714a66a79bc5b0
-
SHA512
4e43aa69a05a88e228cb7b8684505daae3229e81891e70ff2478d8eedbcf528e2543ea5e10a7b53c25a169b3c6364f8744fd6264756df35ed861bc7e03225517
-
SSDEEP
49152:maFO9EzJ1nfrpiM4dHiSX+eqkJJwXPXgtyKJrK6CYJvF6O7r5wipqp:maRJN94dCW67syKJ7rF685wigp
Static task
static1
Behavioral task
behavioral1
Sample
1605b9356f18522e57c43efc975a5f798bf22c20e5d764bddd714a66a79bc5b0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1605b9356f18522e57c43efc975a5f798bf22c20e5d764bddd714a66a79bc5b0.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
cheat
89.23.101.114:1912
Targets
-
-
Target
1605b9356f18522e57c43efc975a5f798bf22c20e5d764bddd714a66a79bc5b0.exe
-
Size
3.0MB
-
MD5
d3a8e596c0edc473d507bb8d08cda1a7
-
SHA1
531462e8b67d0752c1055498d3c514f3405a512b
-
SHA256
1605b9356f18522e57c43efc975a5f798bf22c20e5d764bddd714a66a79bc5b0
-
SHA512
4e43aa69a05a88e228cb7b8684505daae3229e81891e70ff2478d8eedbcf528e2543ea5e10a7b53c25a169b3c6364f8744fd6264756df35ed861bc7e03225517
-
SSDEEP
49152:maFO9EzJ1nfrpiM4dHiSX+eqkJJwXPXgtyKJrK6CYJvF6O7r5wipqp:maRJN94dCW67syKJ7rF685wigp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix ATT&CK v13
Defense Evasion
Subvert Trust Controls
1Install Root Certificate
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2