General
-
Target
1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36
-
Size
1.1MB
-
Sample
230514-y6q5nsde39
-
MD5
3946f9e39d1576a22a64e4f385a4c3e1
-
SHA1
a1b0d9f82366d4974980f0c48037d22134dbece6
-
SHA256
1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36
-
SHA512
772f8242f8da05b5e8633f21b4f7965dc23651fa73dbc8315fc46aaabf2959e5aae99ac274e3e45161c73fbb37d8cd9a36c6c4e95ea8c22cfecb775de2d6ea2c
-
SSDEEP
12288:IMrXy90N97hd//uy9y3f//48Xh9mhFp55RPg9BXtoY2g4yYnw31wjYphHBWDDv78:fyIhd//ufv/Q6GhFpTKH7Ln37HY2x
Static task
static1
Behavioral task
behavioral1
Sample
1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
linda
185.161.248.75:4132
-
auth_value
21cdc21d041667b9c1679f88a1146770
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Targets
-
-
Target
1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36
-
Size
1.1MB
-
MD5
3946f9e39d1576a22a64e4f385a4c3e1
-
SHA1
a1b0d9f82366d4974980f0c48037d22134dbece6
-
SHA256
1b9c75efc9255c0fb55897efc5725b5408cbcebcc90ba84caeca617e1154eb36
-
SHA512
772f8242f8da05b5e8633f21b4f7965dc23651fa73dbc8315fc46aaabf2959e5aae99ac274e3e45161c73fbb37d8cd9a36c6c4e95ea8c22cfecb775de2d6ea2c
-
SSDEEP
12288:IMrXy90N97hd//uy9y3f//48Xh9mhFp55RPg9BXtoY2g4yYnw31wjYphHBWDDv78:fyIhd//ufv/Q6GhFpTKH7Ln37HY2x
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-