General
-
Target
d691029fb53e55a11dfe07987be32aaf729ccf7949de2c051590cdb30f9708bd.exe
-
Size
1.1MB
-
Sample
230514-w79x3afb6v
-
MD5
2432ade161ea210e8042d1e6e674cc79
-
SHA1
42937fb32636854a36c00ea0ce93839f246f20e4
-
SHA256
d691029fb53e55a11dfe07987be32aaf729ccf7949de2c051590cdb30f9708bd
-
SHA512
44a10a3f62e92c0905cb2fd85670566bb7b168a41fce07609a769fe42c559d5ad3e0b31ba0cdd3dc4ab3f8ebb5b244543e9aa87572222790bd409f98eb24e294
-
SSDEEP
24576:iyBBGWvQxp19XfVodpO6+XIr0qUZSOFvJi8eLpUzSX7:JbGcQxp1BV8+XIr8ZScRi8spUzq
Static task
static1
Behavioral task
behavioral1
Sample
d691029fb53e55a11dfe07987be32aaf729ccf7949de2c051590cdb30f9708bd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d691029fb53e55a11dfe07987be32aaf729ccf7949de2c051590cdb30f9708bd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dizan
185.161.248.75:4132
-
auth_value
b14d665c7bca8407646527036302d70c
Extracted
redline
raven
185.161.248.75:4132
-
auth_value
8b22c01d6173ecee1376933bc63c6028
Targets
-
-
Target
d691029fb53e55a11dfe07987be32aaf729ccf7949de2c051590cdb30f9708bd.exe
-
Size
1.1MB
-
MD5
2432ade161ea210e8042d1e6e674cc79
-
SHA1
42937fb32636854a36c00ea0ce93839f246f20e4
-
SHA256
d691029fb53e55a11dfe07987be32aaf729ccf7949de2c051590cdb30f9708bd
-
SHA512
44a10a3f62e92c0905cb2fd85670566bb7b168a41fce07609a769fe42c559d5ad3e0b31ba0cdd3dc4ab3f8ebb5b244543e9aa87572222790bd409f98eb24e294
-
SSDEEP
24576:iyBBGWvQxp19XfVodpO6+XIr0qUZSOFvJi8eLpUzSX7:JbGcQxp1BV8+XIr8ZScRi8spUzq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-