General
-
Target
3b872905689c0a57bbebb581e02c83a07a5072b89aba0a6a66e5e17839f2ad88
-
Size
772KB
-
Sample
230510-ytbt8aab47
-
MD5
0fb8477c6f6ed8697fd86e676899359b
-
SHA1
3fbfee14184d571f479762cdac75b1bd6782d89f
-
SHA256
3b872905689c0a57bbebb581e02c83a07a5072b89aba0a6a66e5e17839f2ad88
-
SHA512
848db915c2861bb8895afdbee855691a2544cff27e3ca4421e32024796fa472c949343f0cbd6c72ebb3c3354a839ee2caae93cf191ec70032d34cdb24b0c5a79
-
SSDEEP
24576:eyqnExFUTq+e7tKupyqpUTHwIBZ0MbZo:tnFUtutPFUTHBT0M1
Static task
static1
Behavioral task
behavioral1
Sample
3b872905689c0a57bbebb581e02c83a07a5072b89aba0a6a66e5e17839f2ad88.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dubur
217.196.96.102:4132
-
auth_value
32d04179aa1e8d655d2d80c21f99de41
Targets
-
-
Target
3b872905689c0a57bbebb581e02c83a07a5072b89aba0a6a66e5e17839f2ad88
-
Size
772KB
-
MD5
0fb8477c6f6ed8697fd86e676899359b
-
SHA1
3fbfee14184d571f479762cdac75b1bd6782d89f
-
SHA256
3b872905689c0a57bbebb581e02c83a07a5072b89aba0a6a66e5e17839f2ad88
-
SHA512
848db915c2861bb8895afdbee855691a2544cff27e3ca4421e32024796fa472c949343f0cbd6c72ebb3c3354a839ee2caae93cf191ec70032d34cdb24b0c5a79
-
SSDEEP
24576:eyqnExFUTq+e7tKupyqpUTHwIBZ0MbZo:tnFUtutPFUTHBT0M1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-