General
-
Target
fc5d9593c5e25bde6fd7f48dc29db4d35d5e658aff016d69ec7f5050e6d8f4ad
-
Size
1.1MB
-
Sample
230515-mvkmzafh27
-
MD5
a5e2c34c335a3b79459edee4a0cc5ea6
-
SHA1
210567a3df43cf2a977e2f9a3c226729f4db0b02
-
SHA256
fc5d9593c5e25bde6fd7f48dc29db4d35d5e658aff016d69ec7f5050e6d8f4ad
-
SHA512
c2af8ff2fa3da50f3cd43a65aa5869c1c76d31c6520c1dbef7cf808777959eb917e5b8766313c0fe075d79ec8b9367d8e0d1756a5420f37d408fa869dc12dab7
-
SSDEEP
24576:3yINeODvk5avmm+XVzs+VIVcvKBRfKlmdViZ:CIN/HLE4pGyB51
Static task
static1
Behavioral task
behavioral1
Sample
fc5d9593c5e25bde6fd7f48dc29db4d35d5e658aff016d69ec7f5050e6d8f4ad.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lays
185.161.248.75:4132
-
auth_value
239cb507c4bb32e630b1bee63365fe29
Extracted
redline
manka
185.161.248.75:4132
-
auth_value
d94715c55e1c02ef0aa67081d47a0c1f
Targets
-
-
Target
fc5d9593c5e25bde6fd7f48dc29db4d35d5e658aff016d69ec7f5050e6d8f4ad
-
Size
1.1MB
-
MD5
a5e2c34c335a3b79459edee4a0cc5ea6
-
SHA1
210567a3df43cf2a977e2f9a3c226729f4db0b02
-
SHA256
fc5d9593c5e25bde6fd7f48dc29db4d35d5e658aff016d69ec7f5050e6d8f4ad
-
SHA512
c2af8ff2fa3da50f3cd43a65aa5869c1c76d31c6520c1dbef7cf808777959eb917e5b8766313c0fe075d79ec8b9367d8e0d1756a5420f37d408fa869dc12dab7
-
SSDEEP
24576:3yINeODvk5avmm+XVzs+VIVcvKBRfKlmdViZ:CIN/HLE4pGyB51
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-