General
-
Target
25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a
-
Size
1.1MB
-
Sample
230515-h7v71shf2z
-
MD5
04aa99f89bfc5bf61daf9449c55db3a2
-
SHA1
ea4e5c467adf6f46d5026e163f40b93cee25f152
-
SHA256
25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a
-
SHA512
5ebfd55ef6a1cfa421cc7dbc79048be21041ad7a82f62c34cbf0e0d82b5e82a0e4a844566ba431333dca7765e89c0ce86ce5c67848154b068c69f7c27b138330
-
SSDEEP
24576:kylyR8qsU7q9LnBQpYsmeeU5utIGEgcZqrdm9t5XdeCju:z4R8q+9LnXsmPouewmTXj
Static task
static1
Behavioral task
behavioral1
Sample
25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Extracted
redline
rumba
185.161.248.75:4132
-
auth_value
35dbb4006087a5d5c211b21be41adb90
Targets
-
-
Target
25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a
-
Size
1.1MB
-
MD5
04aa99f89bfc5bf61daf9449c55db3a2
-
SHA1
ea4e5c467adf6f46d5026e163f40b93cee25f152
-
SHA256
25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a
-
SHA512
5ebfd55ef6a1cfa421cc7dbc79048be21041ad7a82f62c34cbf0e0d82b5e82a0e4a844566ba431333dca7765e89c0ce86ce5c67848154b068c69f7c27b138330
-
SSDEEP
24576:kylyR8qsU7q9LnBQpYsmeeU5utIGEgcZqrdm9t5XdeCju:z4R8q+9LnXsmPouewmTXj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-