General
-
Target
1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37
-
Size
1.1MB
-
Sample
230513-p8zp6agc26
-
MD5
87fca3594324cd24be34016fa221b3f9
-
SHA1
7594bbd77cccf94d178b33c244bd629b31a1d8e0
-
SHA256
1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37
-
SHA512
c0d803969bb28b9a436afb7f7d573d374da8681323fe3d80814aa1a520b6b5281e9035166261e45a5244fa1b5b9762bb32cdf1f3007418fffdd4cd830b970199
-
SSDEEP
24576:ByJnIAjlERZhGITeOepHBTt4qvZNrcpQ6T:0JnIeYhGIWZ4qspQ6
Static task
static1
Behavioral task
behavioral1
Sample
1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dizan
185.161.248.75:4132
-
auth_value
b14d665c7bca8407646527036302d70c
Extracted
redline
raven
185.161.248.75:4132
-
auth_value
8b22c01d6173ecee1376933bc63c6028
Targets
-
-
Target
1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37
-
Size
1.1MB
-
MD5
87fca3594324cd24be34016fa221b3f9
-
SHA1
7594bbd77cccf94d178b33c244bd629b31a1d8e0
-
SHA256
1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37
-
SHA512
c0d803969bb28b9a436afb7f7d573d374da8681323fe3d80814aa1a520b6b5281e9035166261e45a5244fa1b5b9762bb32cdf1f3007418fffdd4cd830b970199
-
SSDEEP
24576:ByJnIAjlERZhGITeOepHBTt4qvZNrcpQ6T:0JnIeYhGIWZ4qspQ6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-