General
-
Target
198343dd2662c0656f5f984f522e3b24829cd80a367fdc22ae464d6635e965d8
-
Size
1.1MB
-
Sample
230514-pqvy9aec2v
-
MD5
ddff71d04de67b2c47a5cd286f9d84b7
-
SHA1
dd6c97b75f14f8c24edca413381a0a9c26946fcc
-
SHA256
198343dd2662c0656f5f984f522e3b24829cd80a367fdc22ae464d6635e965d8
-
SHA512
d2ea8a84f6749dbe3d28393afd41a5e5d74521e88a0447802403267804644c8e53303ab6a5524f4ceee8998ac96a8145918fda22e2f578c804ad2dc98de2de76
-
SSDEEP
24576:/yTQVDhvu/1/V8i7BCBk2jidN2T6cC1nv/bzWtaq1lBG8/aG1:KTQVDtu/1/3BCO2GdN2EjzD0v/a
Static task
static1
Behavioral task
behavioral1
Sample
198343dd2662c0656f5f984f522e3b24829cd80a367fdc22ae464d6635e965d8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
derek
185.161.248.75:4132
-
auth_value
c7030724b2b40537db5ba680b1d82ed2
Extracted
redline
warum
185.161.248.75:4132
-
auth_value
0bdb2dda91dadc65f555dee088a6a2a4
Targets
-
-
Target
198343dd2662c0656f5f984f522e3b24829cd80a367fdc22ae464d6635e965d8
-
Size
1.1MB
-
MD5
ddff71d04de67b2c47a5cd286f9d84b7
-
SHA1
dd6c97b75f14f8c24edca413381a0a9c26946fcc
-
SHA256
198343dd2662c0656f5f984f522e3b24829cd80a367fdc22ae464d6635e965d8
-
SHA512
d2ea8a84f6749dbe3d28393afd41a5e5d74521e88a0447802403267804644c8e53303ab6a5524f4ceee8998ac96a8145918fda22e2f578c804ad2dc98de2de76
-
SSDEEP
24576:/yTQVDhvu/1/V8i7BCBk2jidN2T6cC1nv/bzWtaq1lBG8/aG1:KTQVDtu/1/3BCO2GdN2EjzD0v/a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-