General
-
Target
abc84fe24efcca4702685f14d282b2f33f7064c742fe41fed6ee48900da8677a
-
Size
1.1MB
-
Sample
230513-pftnfaae2y
-
MD5
6a1aae54f670205a40d1722c5709ee92
-
SHA1
53a6218eacf1167650ffb6cc5e67c521c2517d11
-
SHA256
abc84fe24efcca4702685f14d282b2f33f7064c742fe41fed6ee48900da8677a
-
SHA512
a2d75b3c36d3c39a5f8a22226e15e1a013a044068d6ea27206553f3e5e1f4e5db38382816c6d8f5d7d647130c6edd9cac2dd7d1300ad05e0558e9538a1f832b1
-
SSDEEP
24576:zy7ot9/B/pQy9XfVfdqWO9asQzBv9VHxlHNUqK99ZG3IxV02d:Go/Bh1FVvVzBviq0ZGYxO2
Static task
static1
Behavioral task
behavioral1
Sample
abc84fe24efcca4702685f14d282b2f33f7064c742fe41fed6ee48900da8677a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dizan
185.161.248.75:4132
-
auth_value
b14d665c7bca8407646527036302d70c
Extracted
redline
raven
185.161.248.75:4132
-
auth_value
8b22c01d6173ecee1376933bc63c6028
Targets
-
-
Target
abc84fe24efcca4702685f14d282b2f33f7064c742fe41fed6ee48900da8677a
-
Size
1.1MB
-
MD5
6a1aae54f670205a40d1722c5709ee92
-
SHA1
53a6218eacf1167650ffb6cc5e67c521c2517d11
-
SHA256
abc84fe24efcca4702685f14d282b2f33f7064c742fe41fed6ee48900da8677a
-
SHA512
a2d75b3c36d3c39a5f8a22226e15e1a013a044068d6ea27206553f3e5e1f4e5db38382816c6d8f5d7d647130c6edd9cac2dd7d1300ad05e0558e9538a1f832b1
-
SSDEEP
24576:zy7ot9/B/pQy9XfVfdqWO9asQzBv9VHxlHNUqK99ZG3IxV02d:Go/Bh1FVvVzBviq0ZGYxO2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-