General
-
Target
ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d
-
Size
773KB
-
Sample
230510-yre4vsab36
-
MD5
7a43b0e80f19c81ddfef35900041fadb
-
SHA1
8035d44398453495c8fe0891dd524abf90596288
-
SHA256
ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d
-
SHA512
d8068bc1feba40aba8deeecf4258719d373507a7f2d37aabf6e0a87faddc26b5a98eef2b3978004a5dacc84d2145210c55b5394cf8a995238e5a29f1eee770c3
-
SSDEEP
12288:QMrfy907IKfFBDyO8ea5OsdssdL+8e+5JC/z4kL85UUVD0hgVT:fyuAlfdLGIYz428yQ0hwT
Static task
static1
Behavioral task
behavioral1
Sample
ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dubur
217.196.96.102:4132
-
auth_value
32d04179aa1e8d655d2d80c21f99de41
Targets
-
-
Target
ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d
-
Size
773KB
-
MD5
7a43b0e80f19c81ddfef35900041fadb
-
SHA1
8035d44398453495c8fe0891dd524abf90596288
-
SHA256
ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d
-
SHA512
d8068bc1feba40aba8deeecf4258719d373507a7f2d37aabf6e0a87faddc26b5a98eef2b3978004a5dacc84d2145210c55b5394cf8a995238e5a29f1eee770c3
-
SSDEEP
12288:QMrfy907IKfFBDyO8ea5OsdssdL+8e+5JC/z4kL85UUVD0hgVT:fyuAlfdLGIYz428yQ0hwT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-