General
-
Target
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
Size
1.1MB
-
Sample
230513-dja5qafc78
-
MD5
57da9d585d41c86ef3f626179430ba2a
-
SHA1
1d4ffab9c098fe069705666ca1dc88d84e3a58fc
-
SHA256
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
SHA512
116e85a0ac18fcdd4ba1e90325e6e3a36ecf12c7471a99b2aa32e9f2c77ba9e75a92b280c54936b65bb1ecf71c17b2346908aac81a3932f67a5e036727fc8ead
-
SSDEEP
24576:pyEtlMW4iX7gLFkPXhapSlmBd0nPPeuIhH8OrcTGSta8uWt:cwpmLFkPXSFg+hH8mya8uW
Static task
static1
Behavioral task
behavioral1
Sample
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Extracted
redline
joana
185.161.248.75:4132
-
auth_value
85090ed112d639bb782481da2912487a
Targets
-
-
Target
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
Size
1.1MB
-
MD5
57da9d585d41c86ef3f626179430ba2a
-
SHA1
1d4ffab9c098fe069705666ca1dc88d84e3a58fc
-
SHA256
b9a329a9a6480c6bed7a2b9a1edd64cd809a24d1a60fb92673196407f2f4e9bc
-
SHA512
116e85a0ac18fcdd4ba1e90325e6e3a36ecf12c7471a99b2aa32e9f2c77ba9e75a92b280c54936b65bb1ecf71c17b2346908aac81a3932f67a5e036727fc8ead
-
SSDEEP
24576:pyEtlMW4iX7gLFkPXhapSlmBd0nPPeuIhH8OrcTGSta8uWt:cwpmLFkPXSFg+hH8mya8uW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-