General
-
Target
eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17
-
Size
1.1MB
-
Sample
230515-kw7g1sfe59
-
MD5
70a57372c48f0edfe59ebe5df24bbd81
-
SHA1
da42012d341b89fac8fc1c67627abf2605b03b72
-
SHA256
eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17
-
SHA512
538cf1abc59b8368594fac41765661caf6db5b99413367e6a61eb4be190c66c07e77ccf9e9da44b16a64918d781bac7742b31eff4e7b336be2c7c0e3f262747a
-
SSDEEP
24576:byfX2CbOqkyNJHJyM9oOaAVYn5uWtZmtc6UFlOngeHtSZ:OPvy1EHJoAVYnIWtZmrUFlOnN
Static task
static1
Behavioral task
behavioral1
Sample
eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
masha
185.161.248.75:4132
-
auth_value
12fb859bf78abd5eb21bfe471024dffb
Extracted
redline
manka
185.161.248.75:4132
-
auth_value
d94715c55e1c02ef0aa67081d47a0c1f
Targets
-
-
Target
eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17
-
Size
1.1MB
-
MD5
70a57372c48f0edfe59ebe5df24bbd81
-
SHA1
da42012d341b89fac8fc1c67627abf2605b03b72
-
SHA256
eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17
-
SHA512
538cf1abc59b8368594fac41765661caf6db5b99413367e6a61eb4be190c66c07e77ccf9e9da44b16a64918d781bac7742b31eff4e7b336be2c7c0e3f262747a
-
SSDEEP
24576:byfX2CbOqkyNJHJyM9oOaAVYn5uWtZmtc6UFlOngeHtSZ:OPvy1EHJoAVYnIWtZmrUFlOnN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-