General
-
Target
cc4a6fa3ffab3845d24250242263946e15663d8b85a74ab5bfba40269f4fdc31
-
Size
1.1MB
-
Sample
230515-zyw7dsgd7x
-
MD5
cab2c1f8493a3e0a8408c3dc7bff47c5
-
SHA1
168fd7a49942f72b7cbd9e1e5d0718245f891121
-
SHA256
cc4a6fa3ffab3845d24250242263946e15663d8b85a74ab5bfba40269f4fdc31
-
SHA512
19ea6d1ba30e4ffbd855d3016e0525f0a079c199fa4d4bb0146851177e1d6f73049ef0e497c3b772dc890147b005e42939b188e47d2e8a5737c11c75559dfcef
-
SSDEEP
12288:IMr9y90i7Pp7CRGqtSxtu7J8Tm/MBrcliN2kRbb4zVjmczVg79kpmVEr8QVDg0ZP:VyL96b7JUJ2nj7VgZhoxhOHsGuCS
Static task
static1
Behavioral task
behavioral1
Sample
cc4a6fa3ffab3845d24250242263946e15663d8b85a74ab5bfba40269f4fdc31.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dama
185.161.248.25:4132
-
auth_value
d8b2637e0546aea3944c251022b63e77
Extracted
redline
sister
185.161.248.25:4132
-
auth_value
61021810f83e6d5e6ff303aaac03c0e1
Targets
-
-
Target
cc4a6fa3ffab3845d24250242263946e15663d8b85a74ab5bfba40269f4fdc31
-
Size
1.1MB
-
MD5
cab2c1f8493a3e0a8408c3dc7bff47c5
-
SHA1
168fd7a49942f72b7cbd9e1e5d0718245f891121
-
SHA256
cc4a6fa3ffab3845d24250242263946e15663d8b85a74ab5bfba40269f4fdc31
-
SHA512
19ea6d1ba30e4ffbd855d3016e0525f0a079c199fa4d4bb0146851177e1d6f73049ef0e497c3b772dc890147b005e42939b188e47d2e8a5737c11c75559dfcef
-
SSDEEP
12288:IMr9y90i7Pp7CRGqtSxtu7J8Tm/MBrcliN2kRbb4zVjmczVg79kpmVEr8QVDg0ZP:VyL96b7JUJ2nj7VgZhoxhOHsGuCS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-