General
-
Target
file.exe
-
Size
2.6MB
-
Sample
230423-gjsxbada5s
-
MD5
595c641e1e7d089bba4704da751d8ca1
-
SHA1
0978659af6c1fd8e1e68cb01efca462e79c371cf
-
SHA256
f2d67d7c5e9bf1f4b093ba63a7c4fddf26571b0d083e675646504da0e5a390c0
-
SHA512
1e258a708806580ee3936ef6dfe09aa5516f389aa6159ceeea5263534c5c604cb88813b0073487715b39fe13b06c2c0a184aedd4c53880b065f3bfa259424aa8
-
SSDEEP
49152:IBJ1VMeFLH5Or9d+9QjaAPC70V1ev4iFu+krSd0PAZQZCQJLNAcEap:y/VMQDQ9KuvC7O1ev4iUW06/aL
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Targets
-
-
Target
file.exe
-
Size
2.6MB
-
MD5
595c641e1e7d089bba4704da751d8ca1
-
SHA1
0978659af6c1fd8e1e68cb01efca462e79c371cf
-
SHA256
f2d67d7c5e9bf1f4b093ba63a7c4fddf26571b0d083e675646504da0e5a390c0
-
SHA512
1e258a708806580ee3936ef6dfe09aa5516f389aa6159ceeea5263534c5c604cb88813b0073487715b39fe13b06c2c0a184aedd4c53880b065f3bfa259424aa8
-
SSDEEP
49152:IBJ1VMeFLH5Or9d+9QjaAPC70V1ev4iFu+krSd0PAZQZCQJLNAcEap:y/VMQDQ9KuvC7O1ev4iUW06/aL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-