General
-
Target
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.bin
-
Size
885KB
-
Sample
230511-w8yanahd53
-
MD5
bf32ddde84500046bf1d33923fe9e15e
-
SHA1
9b2132e500a341d19ba1463e04de04c0fb2750c9
-
SHA256
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb
-
SHA512
4195fe6ca5db25868a3be04e913ec0a8e0f85b47c50ff9717e9b294e3f3a088455bd1021c6a49050ae2522de43b3231c57972a4c3bab845c4042b3759ed0791b
-
SSDEEP
24576:jyQ/PsUHGXwdr3d5IBuWwe6tBaweU/Q8amo+Z:2QsUfWZ63awewamo
Static task
static1
Behavioral task
behavioral1
Sample
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
debro
185.161.248.75:4132
-
auth_value
18c2c191aebfde5d1787ec8d805a01a8
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Targets
-
-
Target
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.bin
-
Size
885KB
-
MD5
bf32ddde84500046bf1d33923fe9e15e
-
SHA1
9b2132e500a341d19ba1463e04de04c0fb2750c9
-
SHA256
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb
-
SHA512
4195fe6ca5db25868a3be04e913ec0a8e0f85b47c50ff9717e9b294e3f3a088455bd1021c6a49050ae2522de43b3231c57972a4c3bab845c4042b3759ed0791b
-
SSDEEP
24576:jyQ/PsUHGXwdr3d5IBuWwe6tBaweU/Q8amo+Z:2QsUfWZ63awewamo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-