General
-
Target
0bbaab94b7460c56696d6fae8fd39531f978e3b3e302f40cac3f4c27524a3dcd
-
Size
1.1MB
-
Sample
230513-nfn8aaga97
-
MD5
d2cacb54ab959848c8f6ffb4f517c604
-
SHA1
b1d16c057c63b76395a40d84a7ad6af404436a36
-
SHA256
0bbaab94b7460c56696d6fae8fd39531f978e3b3e302f40cac3f4c27524a3dcd
-
SHA512
71c16d7219fa0f7da2c85fca9740740ee1c41b0c475ee9fad34066f3bcecdc5b9b228711ad3de6c86632f673106a0d88bab053672e940eb3054ad9eef7c672e3
-
SSDEEP
24576:PyNGQA9gE/Sw7B1dbV9a9LDqo3LHaemd4vc58sIqQ:aNhA3/SwcGOHaeGR
Static task
static1
Behavioral task
behavioral1
Sample
0bbaab94b7460c56696d6fae8fd39531f978e3b3e302f40cac3f4c27524a3dcd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
miran
185.161.248.75:4132
-
auth_value
f1084732cb99b2cbe314a2a565371e6c
Extracted
redline
raven
185.161.248.75:4132
-
auth_value
8b22c01d6173ecee1376933bc63c6028
Targets
-
-
Target
0bbaab94b7460c56696d6fae8fd39531f978e3b3e302f40cac3f4c27524a3dcd
-
Size
1.1MB
-
MD5
d2cacb54ab959848c8f6ffb4f517c604
-
SHA1
b1d16c057c63b76395a40d84a7ad6af404436a36
-
SHA256
0bbaab94b7460c56696d6fae8fd39531f978e3b3e302f40cac3f4c27524a3dcd
-
SHA512
71c16d7219fa0f7da2c85fca9740740ee1c41b0c475ee9fad34066f3bcecdc5b9b228711ad3de6c86632f673106a0d88bab053672e940eb3054ad9eef7c672e3
-
SSDEEP
24576:PyNGQA9gE/Sw7B1dbV9a9LDqo3LHaemd4vc58sIqQ:aNhA3/SwcGOHaeGR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-