General
-
Target
d5b603d600d6d00ae38cab11c0700ef2.bin
-
Size
435KB
-
Sample
230508-b9y85age77
-
MD5
62fb435465697bd37f8e39e91d3887d1
-
SHA1
a88e7b74573aa845a4cd7f0cdee55f9e41ee5b9c
-
SHA256
2d58bf46256d9957dd508fa2e295dca25ac4ffef09599523b79d4a968cb56bf5
-
SHA512
32261b21cd97d41f5e790f33ddb1934e9b0062a7a04cd7c3e48906f8b88c796785643bc2a8712255c65072d4041abe42f5efdb748befdd6745508e001cdb0758
-
SSDEEP
6144:KkcpI/cbb0C7m/a8n1zKTCgCL7cfXtxXQORFGhYGHUeslvN9kZy1mlJw9zkkv+pD:KkU8iuOTnfXvAOedHoRNyaE+Hv+mpX9W
Static task
static1
Behavioral task
behavioral1
Sample
5d20c911a61ca2afc8f3cba61d942e3d45a563626d87742e1b30c13519f61b33.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5d20c911a61ca2afc8f3cba61d942e3d45a563626d87742e1b30c13519f61b33.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Targets
-
-
Target
5d20c911a61ca2afc8f3cba61d942e3d45a563626d87742e1b30c13519f61b33.exe
-
Size
479KB
-
MD5
d5b603d600d6d00ae38cab11c0700ef2
-
SHA1
0227afab9718a9f07a267155296f7cb1265077d8
-
SHA256
5d20c911a61ca2afc8f3cba61d942e3d45a563626d87742e1b30c13519f61b33
-
SHA512
d05f4452a86c8fbd2a5f431c532366e2df0b3179c198c06537c7b795c8dab96943fe7a1a1efe16163998b10faa9bebbe039089a92013e2d748adb4957dbb21a7
-
SSDEEP
12288:yMrGy90DceqXfV6pnGb5c1u317Toqf73raeg+v67cON:Ay/eefV2GFXZTjDeegbwON
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-