General
-
Target
e30717457d690f84bac1310c6ca40671971e5c7a0d50b90618f72196675385b8
-
Size
770KB
-
Sample
230511-dn7z9adc3z
-
MD5
bb7f34c6fefe78220c753e15eafb7603
-
SHA1
9cd5c3c66491d10af15682909bd04cd87ccb25c2
-
SHA256
e30717457d690f84bac1310c6ca40671971e5c7a0d50b90618f72196675385b8
-
SHA512
eafe68aff6cc9fafebd10016f0affadb1bfe67829744076cc94038d3c89bddffdaff9ee662c09c383afd650bc982a06c03e854b486f676f29250e594c54462ef
-
SSDEEP
12288:6MrMy90LC+6jHT9y4bJneq6ae76GizWC30KvOeAagf0EgWq3fds6941GiXVayih:uyG45RQbxoWeAaDPMG4Yh
Static task
static1
Behavioral task
behavioral1
Sample
e30717457d690f84bac1310c6ca40671971e5c7a0d50b90618f72196675385b8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
debro
185.161.248.75:4132
-
auth_value
18c2c191aebfde5d1787ec8d805a01a8
Targets
-
-
Target
e30717457d690f84bac1310c6ca40671971e5c7a0d50b90618f72196675385b8
-
Size
770KB
-
MD5
bb7f34c6fefe78220c753e15eafb7603
-
SHA1
9cd5c3c66491d10af15682909bd04cd87ccb25c2
-
SHA256
e30717457d690f84bac1310c6ca40671971e5c7a0d50b90618f72196675385b8
-
SHA512
eafe68aff6cc9fafebd10016f0affadb1bfe67829744076cc94038d3c89bddffdaff9ee662c09c383afd650bc982a06c03e854b486f676f29250e594c54462ef
-
SSDEEP
12288:6MrMy90LC+6jHT9y4bJneq6ae76GizWC30KvOeAagf0EgWq3fds6941GiXVayih:uyG45RQbxoWeAaDPMG4Yh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-