General
-
Target
baf063e86e13364141e2c2adafe3aebb188420e6796f3a5ea409f44cecef8d0b
-
Size
1.1MB
-
Sample
230514-t3kfhaeg4x
-
MD5
21ab088311aff9f323efb26ce6b035cc
-
SHA1
f029de93f8301ecceb8485979488806c6d8a46fa
-
SHA256
baf063e86e13364141e2c2adafe3aebb188420e6796f3a5ea409f44cecef8d0b
-
SHA512
e4b6cda6cf06f02bb5ce3d8c608ce2468c47c3d110d2a6518e12539c0217c206c8043834425c5b3af94db296fc2391bd0b3dc803ab7f6489e8e1e88146c42286
-
SSDEEP
24576:fyQ1cX2f1vGEeB/4uL8fOTeAqtpZ9Psq0gV5j1jTLNaeZu:qQF1OEeVv8fOTeAOuqZ5j1jXNlZ
Static task
static1
Behavioral task
behavioral1
Sample
baf063e86e13364141e2c2adafe3aebb188420e6796f3a5ea409f44cecef8d0b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
derek
185.161.248.75:4132
-
auth_value
c7030724b2b40537db5ba680b1d82ed2
Extracted
redline
warum
185.161.248.75:4132
-
auth_value
0bdb2dda91dadc65f555dee088a6a2a4
Targets
-
-
Target
baf063e86e13364141e2c2adafe3aebb188420e6796f3a5ea409f44cecef8d0b
-
Size
1.1MB
-
MD5
21ab088311aff9f323efb26ce6b035cc
-
SHA1
f029de93f8301ecceb8485979488806c6d8a46fa
-
SHA256
baf063e86e13364141e2c2adafe3aebb188420e6796f3a5ea409f44cecef8d0b
-
SHA512
e4b6cda6cf06f02bb5ce3d8c608ce2468c47c3d110d2a6518e12539c0217c206c8043834425c5b3af94db296fc2391bd0b3dc803ab7f6489e8e1e88146c42286
-
SSDEEP
24576:fyQ1cX2f1vGEeB/4uL8fOTeAqtpZ9Psq0gV5j1jTLNaeZu:qQF1OEeVv8fOTeAOuqZ5j1jXNlZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-