General
-
Target
e0d283c0ffa6710d51b8143e60ed5fa55b772ec1e130f7f3b1d2a914a0122ec1.exe
-
Size
1.1MB
-
Sample
230514-w89npafc2t
-
MD5
cc3c2886c63ae3635aa98cd820e6f81e
-
SHA1
689c7054078ee818139387fe911204b3b1be53d2
-
SHA256
e0d283c0ffa6710d51b8143e60ed5fa55b772ec1e130f7f3b1d2a914a0122ec1
-
SHA512
f0e58b973f765288e57a01204ecdf5b9f517a033ce824e30345b0fdd7a5babd56103763031149698162fd43359676c4dc5b6fc517058db431f9e2a789b3c4ce3
-
SSDEEP
24576:Mypl3Cs3iv3ZlJVt5yyPJzHeMtLAqzYfR7F08m4auWvUo5+:7plrirJVt5fxnSfddauCUo
Static task
static1
Behavioral task
behavioral1
Sample
e0d283c0ffa6710d51b8143e60ed5fa55b772ec1e130f7f3b1d2a914a0122ec1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e0d283c0ffa6710d51b8143e60ed5fa55b772ec1e130f7f3b1d2a914a0122ec1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
messi
185.161.248.75:4132
-
auth_value
b602b28664bb738e322d37baab91db28
Extracted
redline
warum
185.161.248.75:4132
-
auth_value
0bdb2dda91dadc65f555dee088a6a2a4
Targets
-
-
Target
e0d283c0ffa6710d51b8143e60ed5fa55b772ec1e130f7f3b1d2a914a0122ec1.exe
-
Size
1.1MB
-
MD5
cc3c2886c63ae3635aa98cd820e6f81e
-
SHA1
689c7054078ee818139387fe911204b3b1be53d2
-
SHA256
e0d283c0ffa6710d51b8143e60ed5fa55b772ec1e130f7f3b1d2a914a0122ec1
-
SHA512
f0e58b973f765288e57a01204ecdf5b9f517a033ce824e30345b0fdd7a5babd56103763031149698162fd43359676c4dc5b6fc517058db431f9e2a789b3c4ce3
-
SSDEEP
24576:Mypl3Cs3iv3ZlJVt5yyPJzHeMtLAqzYfR7F08m4auWvUo5+:7plrirJVt5fxnSfddauCUo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-