General
-
Target
b3c5914d6189871e00bff66b5a940043592b7b7edda2243e6089328741787ff9
-
Size
1.1MB
-
Sample
230514-1wnb5sga3t
-
MD5
04feb02de1000af75c760f672949f803
-
SHA1
7ed07c6426a7744f86564d97a1ea072260ad06e5
-
SHA256
b3c5914d6189871e00bff66b5a940043592b7b7edda2243e6089328741787ff9
-
SHA512
1b765ee107aaccd5142fb9e3683d9ffd4435896df2510f56b5e25a3c2852c950e7ca0e38eaa599f748e7d19ffdb75a8841ee682cd6971e6629a2dd590766e08a
-
SSDEEP
24576:VytmT5sKSYFgkbDgD2Jpe/aeoOA3ZIEbyG6Z6PXiZCYBp3:wUTQYFggkEp3ekpI9l6PirB
Static task
static1
Behavioral task
behavioral1
Sample
b3c5914d6189871e00bff66b5a940043592b7b7edda2243e6089328741787ff9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
linda
185.161.248.75:4132
-
auth_value
21cdc21d041667b9c1679f88a1146770
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Targets
-
-
Target
b3c5914d6189871e00bff66b5a940043592b7b7edda2243e6089328741787ff9
-
Size
1.1MB
-
MD5
04feb02de1000af75c760f672949f803
-
SHA1
7ed07c6426a7744f86564d97a1ea072260ad06e5
-
SHA256
b3c5914d6189871e00bff66b5a940043592b7b7edda2243e6089328741787ff9
-
SHA512
1b765ee107aaccd5142fb9e3683d9ffd4435896df2510f56b5e25a3c2852c950e7ca0e38eaa599f748e7d19ffdb75a8841ee682cd6971e6629a2dd590766e08a
-
SSDEEP
24576:VytmT5sKSYFgkbDgD2Jpe/aeoOA3ZIEbyG6Z6PXiZCYBp3:wUTQYFggkEp3ekpI9l6PirB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-