General
-
Target
5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00
-
Size
884KB
-
Sample
230511-sg43caga4x
-
MD5
b8316a557cf7bef42c42923449e423b0
-
SHA1
0c73d7745f9abc98964055d932e01782db9da11b
-
SHA256
5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00
-
SHA512
b145401fefda352adfd96952149596eae13e7981c77c7cd3de55f243663ed0f737c23e55cd3960361b57bef57897c4123201c480969c335bb4ab9371ad105aaf
-
SSDEEP
12288:/MrEy90iw9dJnQSYkQz/rGG/1Am2prA9bigPsnooy/b5VJsrE2u9EbaC:3yA9bQHkQ+MAnE9mgEoN/Lv2haC
Static task
static1
Behavioral task
behavioral1
Sample
5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Targets
-
-
Target
5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00
-
Size
884KB
-
MD5
b8316a557cf7bef42c42923449e423b0
-
SHA1
0c73d7745f9abc98964055d932e01782db9da11b
-
SHA256
5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00
-
SHA512
b145401fefda352adfd96952149596eae13e7981c77c7cd3de55f243663ed0f737c23e55cd3960361b57bef57897c4123201c480969c335bb4ab9371ad105aaf
-
SSDEEP
12288:/MrEy90iw9dJnQSYkQz/rGG/1Am2prA9bigPsnooy/b5VJsrE2u9EbaC:3yA9bQHkQ+MAnE9mgEoN/Lv2haC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-