General
-
Target
ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0
-
Size
1.1MB
-
Sample
230513-qd3c8sae71
-
MD5
0c158c8131d7342d367cddead002c8d0
-
SHA1
e1b1524857f1e4ae6ea9408e27529b3daaac636e
-
SHA256
ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0
-
SHA512
4d6efc3bbad918666cc1ecd03d7964b0cd01e0943ba83daa60171c34a8cb3ef96448926c371255ab4a122318af821c2b971965a88dc54e074cfe60aa50c4a2bb
-
SSDEEP
24576:zybaVV9byzVhnUeX9+I+eNfKgRDAyU1x7Ssra4c6vwEDURuc2/WH:G2VmzXUeXx+eNfzATtO43nG92/
Static task
static1
Behavioral task
behavioral1
Sample
ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
miran
185.161.248.75:4132
-
auth_value
f1084732cb99b2cbe314a2a565371e6c
Extracted
redline
raven
185.161.248.75:4132
-
auth_value
8b22c01d6173ecee1376933bc63c6028
Targets
-
-
Target
ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0
-
Size
1.1MB
-
MD5
0c158c8131d7342d367cddead002c8d0
-
SHA1
e1b1524857f1e4ae6ea9408e27529b3daaac636e
-
SHA256
ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0
-
SHA512
4d6efc3bbad918666cc1ecd03d7964b0cd01e0943ba83daa60171c34a8cb3ef96448926c371255ab4a122318af821c2b971965a88dc54e074cfe60aa50c4a2bb
-
SSDEEP
24576:zybaVV9byzVhnUeX9+I+eNfKgRDAyU1x7Ssra4c6vwEDURuc2/WH:G2VmzXUeXx+eNfzATtO43nG92/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-