General
-
Target
ea7ab7d36e5120a8a3f25e0a9a4b87c28f535c7ca3d1f34f05bc188d8a6c44df.exe
-
Size
1.1MB
-
Sample
230514-xaax5sda85
-
MD5
e4cf6ecf6df908bcf7feaf23f9ee0bf0
-
SHA1
5da451888d514423e31da65c579d03d69288f391
-
SHA256
ea7ab7d36e5120a8a3f25e0a9a4b87c28f535c7ca3d1f34f05bc188d8a6c44df
-
SHA512
00f261f1937b8b78a6dd05c4e29ab1f0c9f48363d0da854425ae4927820a70d08c50d9ad2d4f280e0d000a8f0d1a420d50f85f288f3848bae852a14c8355bcc4
-
SSDEEP
24576:hyBKM94FHU8P9xNTvMlerlFi3bi4q3iqJsDKWs:UBKM6RdZTv7raFq3iqkK
Static task
static1
Behavioral task
behavioral1
Sample
ea7ab7d36e5120a8a3f25e0a9a4b87c28f535c7ca3d1f34f05bc188d8a6c44df.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ea7ab7d36e5120a8a3f25e0a9a4b87c28f535c7ca3d1f34f05bc188d8a6c44df.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
miran
185.161.248.75:4132
-
auth_value
f1084732cb99b2cbe314a2a565371e6c
Extracted
redline
raven
185.161.248.75:4132
-
auth_value
8b22c01d6173ecee1376933bc63c6028
Targets
-
-
Target
ea7ab7d36e5120a8a3f25e0a9a4b87c28f535c7ca3d1f34f05bc188d8a6c44df.exe
-
Size
1.1MB
-
MD5
e4cf6ecf6df908bcf7feaf23f9ee0bf0
-
SHA1
5da451888d514423e31da65c579d03d69288f391
-
SHA256
ea7ab7d36e5120a8a3f25e0a9a4b87c28f535c7ca3d1f34f05bc188d8a6c44df
-
SHA512
00f261f1937b8b78a6dd05c4e29ab1f0c9f48363d0da854425ae4927820a70d08c50d9ad2d4f280e0d000a8f0d1a420d50f85f288f3848bae852a14c8355bcc4
-
SSDEEP
24576:hyBKM94FHU8P9xNTvMlerlFi3bi4q3iqJsDKWs:UBKM6RdZTv7raFq3iqkK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-