General
-
Target
7709aa9353b1eb9d5bab9b0e8ad04ff35fa5cb1657c9cf7016f06ee4af640a35
-
Size
1.1MB
-
Sample
230514-3znhesgc5y
-
MD5
97d7764f5b7d082a2e266ff1d784a0b4
-
SHA1
5db766b7cc8437cc90cd8f1e8b4fd77e03e91b1c
-
SHA256
7709aa9353b1eb9d5bab9b0e8ad04ff35fa5cb1657c9cf7016f06ee4af640a35
-
SHA512
d4ac3da47b1bb2f77ca1a7c84da7ab5c2833546da237153cdee5348fddf582651f4a15700a7c1c1bb06114f1316f4b12d180136cf91ddfe644ab175d174e9556
-
SSDEEP
24576:+yRnxhmUlobTasNYf+wqUbAqjO2F51nwwxy7:NRnx3lobTzYf9qhOF51w
Static task
static1
Behavioral task
behavioral1
Sample
7709aa9353b1eb9d5bab9b0e8ad04ff35fa5cb1657c9cf7016f06ee4af640a35.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lopuh
185.161.248.75:4132
-
auth_value
5852b05de9da526581993068a4e7e915
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Targets
-
-
Target
7709aa9353b1eb9d5bab9b0e8ad04ff35fa5cb1657c9cf7016f06ee4af640a35
-
Size
1.1MB
-
MD5
97d7764f5b7d082a2e266ff1d784a0b4
-
SHA1
5db766b7cc8437cc90cd8f1e8b4fd77e03e91b1c
-
SHA256
7709aa9353b1eb9d5bab9b0e8ad04ff35fa5cb1657c9cf7016f06ee4af640a35
-
SHA512
d4ac3da47b1bb2f77ca1a7c84da7ab5c2833546da237153cdee5348fddf582651f4a15700a7c1c1bb06114f1316f4b12d180136cf91ddfe644ab175d174e9556
-
SSDEEP
24576:+yRnxhmUlobTasNYf+wqUbAqjO2F51nwwxy7:NRnx3lobTzYf9qhOF51w
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-