General
-
Target
e97e9aa829def5f00948bc81cab995575b50ce9c66d7206d305b408b73a22dfc.bin
-
Size
885KB
-
Sample
230511-xd9wmshh49
-
MD5
e5f894cb30a0f3ac102b0ada4893fd80
-
SHA1
2168c5f4c4863de1c9e761cc35370a998c1ec7ee
-
SHA256
e97e9aa829def5f00948bc81cab995575b50ce9c66d7206d305b408b73a22dfc
-
SHA512
87318ae9e914b58814841d6d81dde5ff7958e4b17e69aa2bc452edb964ec9134dfd61b4bb4e733d371fd256b57bd014052d7a94750c53fb2ad64813a501b71d7
-
SSDEEP
24576:uy1udS4FH0HaLpBQ8BkJXR8L1yVQFrZ35ht8/Y4:91uFHkUTq+qUrJ5X
Static task
static1
Behavioral task
behavioral1
Sample
e97e9aa829def5f00948bc81cab995575b50ce9c66d7206d305b408b73a22dfc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e97e9aa829def5f00948bc81cab995575b50ce9c66d7206d305b408b73a22dfc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
debro
185.161.248.75:4132
-
auth_value
18c2c191aebfde5d1787ec8d805a01a8
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Targets
-
-
Target
e97e9aa829def5f00948bc81cab995575b50ce9c66d7206d305b408b73a22dfc.bin
-
Size
885KB
-
MD5
e5f894cb30a0f3ac102b0ada4893fd80
-
SHA1
2168c5f4c4863de1c9e761cc35370a998c1ec7ee
-
SHA256
e97e9aa829def5f00948bc81cab995575b50ce9c66d7206d305b408b73a22dfc
-
SHA512
87318ae9e914b58814841d6d81dde5ff7958e4b17e69aa2bc452edb964ec9134dfd61b4bb4e733d371fd256b57bd014052d7a94750c53fb2ad64813a501b71d7
-
SSDEEP
24576:uy1udS4FH0HaLpBQ8BkJXR8L1yVQFrZ35ht8/Y4:91uFHkUTq+qUrJ5X
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-