General
-
Target
a21804adde74244ba0e91402f80feadad80b19a1f6ea4418ee83095c18d7ffcd
-
Size
1.1MB
-
Sample
230513-pjjyeaae3v
-
MD5
8f05c8cf1bb71b56eb9deb0fb6036883
-
SHA1
c22efbf1cd0b522fec079a05bec00a6fe21330b1
-
SHA256
a21804adde74244ba0e91402f80feadad80b19a1f6ea4418ee83095c18d7ffcd
-
SHA512
b5fdbf78e2e4fb8e179f7b5c237d2d3ca4742a1b9070fc103c74899a9f3722d217aeafd3c426beddb8149d8c4af2bdfefb742471741c392545935fca0652cdd0
-
SSDEEP
24576:Dyty7symBRJ7GMu9VfVkdrmYY7CGMZTlG1JJ7mbwrzbZ:WtSsysJgLVRMl6j7Awnb
Static task
static1
Behavioral task
behavioral1
Sample
a21804adde74244ba0e91402f80feadad80b19a1f6ea4418ee83095c18d7ffcd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dizan
185.161.248.75:4132
-
auth_value
b14d665c7bca8407646527036302d70c
Extracted
redline
raven
185.161.248.75:4132
-
auth_value
8b22c01d6173ecee1376933bc63c6028
Targets
-
-
Target
a21804adde74244ba0e91402f80feadad80b19a1f6ea4418ee83095c18d7ffcd
-
Size
1.1MB
-
MD5
8f05c8cf1bb71b56eb9deb0fb6036883
-
SHA1
c22efbf1cd0b522fec079a05bec00a6fe21330b1
-
SHA256
a21804adde74244ba0e91402f80feadad80b19a1f6ea4418ee83095c18d7ffcd
-
SHA512
b5fdbf78e2e4fb8e179f7b5c237d2d3ca4742a1b9070fc103c74899a9f3722d217aeafd3c426beddb8149d8c4af2bdfefb742471741c392545935fca0652cdd0
-
SSDEEP
24576:Dyty7symBRJ7GMu9VfVkdrmYY7CGMZTlG1JJ7mbwrzbZ:WtSsysJgLVRMl6j7Awnb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-