General
-
Target
2eb986483286ad3ceb044309806e88613476e0c71ae9cced414b7a25bfb7b26d.bin
-
Size
873KB
-
Sample
230511-w71pdshc64
-
MD5
e76c27c01f16c4b67f5f9d5021b83878
-
SHA1
eecfd60647803b2e7576c4f24bc34dbbf4ecfbd1
-
SHA256
2eb986483286ad3ceb044309806e88613476e0c71ae9cced414b7a25bfb7b26d
-
SHA512
5f143a3e63e04c4a752f55899068443bc0aeb8b7343e5612596b29be5c2617e6115a91484f0c1b010d1192bf5a00624f5f6812a81d8ed54c740dcad309df8c65
-
SSDEEP
24576:ryXnoXm30mARnuGzvUOpnjtgWyxKhlHiH:e4WkmBGjvx2VxKrH
Static task
static1
Behavioral task
behavioral1
Sample
2eb986483286ad3ceb044309806e88613476e0c71ae9cced414b7a25bfb7b26d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2eb986483286ad3ceb044309806e88613476e0c71ae9cced414b7a25bfb7b26d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diora
185.161.248.75:4132
-
auth_value
4c17e0c4a574a5b11a6e41e692dedcb3
Extracted
redline
roza
185.161.248.75:4132
-
auth_value
3e701c8c522386806a8f1f40a90873a7
Targets
-
-
Target
2eb986483286ad3ceb044309806e88613476e0c71ae9cced414b7a25bfb7b26d.bin
-
Size
873KB
-
MD5
e76c27c01f16c4b67f5f9d5021b83878
-
SHA1
eecfd60647803b2e7576c4f24bc34dbbf4ecfbd1
-
SHA256
2eb986483286ad3ceb044309806e88613476e0c71ae9cced414b7a25bfb7b26d
-
SHA512
5f143a3e63e04c4a752f55899068443bc0aeb8b7343e5612596b29be5c2617e6115a91484f0c1b010d1192bf5a00624f5f6812a81d8ed54c740dcad309df8c65
-
SSDEEP
24576:ryXnoXm30mARnuGzvUOpnjtgWyxKhlHiH:e4WkmBGjvx2VxKrH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-