General
-
Target
22ef9c8fc52cd4f9fae4e7e7754c45ea570e0ebd3fbd15463f5fcd8d0da43f65
-
Size
1.1MB
-
Sample
230515-hgjfjahe2w
-
MD5
a3d724951d9d7b43c67374d01f906eb8
-
SHA1
774eb49d33ff46dda6d56c6da0cf12841385f956
-
SHA256
22ef9c8fc52cd4f9fae4e7e7754c45ea570e0ebd3fbd15463f5fcd8d0da43f65
-
SHA512
21504f222404e941765aa771b9fa579ad878f0bfbc5ca828ceedb2fda1763eb0d2c816fc60b35f01078306fb0cd8ce94254b480636f7c1423ed69bb18694ac45
-
SSDEEP
24576:OyKW+NlDZ6Oc1RUBwHOtiPURELnqUXx/ZL8EuolC4G/2SCmDNSn5s:dHmlDxc1RUiHOiPZq+Ao84GRDc
Static task
static1
Behavioral task
behavioral1
Sample
22ef9c8fc52cd4f9fae4e7e7754c45ea570e0ebd3fbd15463f5fcd8d0da43f65.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Extracted
redline
rumba
185.161.248.75:4132
-
auth_value
35dbb4006087a5d5c211b21be41adb90
Targets
-
-
Target
22ef9c8fc52cd4f9fae4e7e7754c45ea570e0ebd3fbd15463f5fcd8d0da43f65
-
Size
1.1MB
-
MD5
a3d724951d9d7b43c67374d01f906eb8
-
SHA1
774eb49d33ff46dda6d56c6da0cf12841385f956
-
SHA256
22ef9c8fc52cd4f9fae4e7e7754c45ea570e0ebd3fbd15463f5fcd8d0da43f65
-
SHA512
21504f222404e941765aa771b9fa579ad878f0bfbc5ca828ceedb2fda1763eb0d2c816fc60b35f01078306fb0cd8ce94254b480636f7c1423ed69bb18694ac45
-
SSDEEP
24576:OyKW+NlDZ6Oc1RUBwHOtiPURELnqUXx/ZL8EuolC4G/2SCmDNSn5s:dHmlDxc1RUiHOiPZq+Ao84GRDc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-