General
-
Target
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
-
Size
1.4MB
-
Sample
240904-cetwlashmr
-
MD5
9f5fea618279281fdc697b0d43760a16
-
SHA1
198b4078dd03e7cc8d58c024fcc8956704a87893
-
SHA256
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883
-
SHA512
e80df43046447f29c23ec05a16ffd4003efacec15eca5ad16dbe15345174621f5ad7752a23cd1b5268ec46ae74c283233dbb223e8e2557a9f3c87a70c4f4f6e4
-
SSDEEP
24576:Z9/YFro7myA9aUx6P2lms+OKMREuMJY3cOz9ra:ZOp9MUxKyKMRfMJMla
Static task
static1
Behavioral task
behavioral1
Sample
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
unique0109
185.215.113.67:21405
Targets
-
-
Target
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883.exe
-
Size
1.4MB
-
MD5
9f5fea618279281fdc697b0d43760a16
-
SHA1
198b4078dd03e7cc8d58c024fcc8956704a87893
-
SHA256
92a24e160937ec00bd6a8e855cd55b9329760131c1412f35b18c92aacc299883
-
SHA512
e80df43046447f29c23ec05a16ffd4003efacec15eca5ad16dbe15345174621f5ad7752a23cd1b5268ec46ae74c283233dbb223e8e2557a9f3c87a70c4f4f6e4
-
SSDEEP
24576:Z9/YFro7myA9aUx6P2lms+OKMREuMJY3cOz9ra:ZOp9MUxKyKMRfMJMla
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2