General
-
Target
c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa
-
Size
1.1MB
-
Sample
230515-jxggjshg4v
-
MD5
d0f64ccd52179cabe1628085035ea938
-
SHA1
852f1ec092a4b86bc3e9acccebf237f631ecb3f1
-
SHA256
c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa
-
SHA512
6fe06d03acf9f41dbb3ae79dfe467dd3672139dea5ef1ba19f7467473ec0eca8ded9d5afcaf7e34f99080dc726ad9d0faf9baa8bc146b675de745c5e4b8e4681
-
SSDEEP
24576:8yDLCCvnTEFjq9dmjrOUWpG689O3GWCKsz+a8P1C9ij3ZYXvImj4:rDuGuGTmjqUWpNqJz+a8PZN2vV
Static task
static1
Behavioral task
behavioral1
Sample
c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lopuh
185.161.248.75:4132
-
auth_value
5852b05de9da526581993068a4e7e915
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Targets
-
-
Target
c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa
-
Size
1.1MB
-
MD5
d0f64ccd52179cabe1628085035ea938
-
SHA1
852f1ec092a4b86bc3e9acccebf237f631ecb3f1
-
SHA256
c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa
-
SHA512
6fe06d03acf9f41dbb3ae79dfe467dd3672139dea5ef1ba19f7467473ec0eca8ded9d5afcaf7e34f99080dc726ad9d0faf9baa8bc146b675de745c5e4b8e4681
-
SSDEEP
24576:8yDLCCvnTEFjq9dmjrOUWpG689O3GWCKsz+a8P1C9ij3ZYXvImj4:rDuGuGTmjqUWpNqJz+a8PZN2vV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-