General
-
Target
bff00e025f4b5bfe5d512e55768d96a6440d7f921af4e526475439f25ae4fde4
-
Size
1.0MB
-
Sample
230516-26rb8ada22
-
MD5
dd143d27043a8f54ac27735fd26504d2
-
SHA1
b5de1768a916fc4c3fd261a4a43cd212c4c8c789
-
SHA256
bff00e025f4b5bfe5d512e55768d96a6440d7f921af4e526475439f25ae4fde4
-
SHA512
57b538e8dd791678850a696df3a506a20fa3f897e3dcf61c21e2bdc1d6f6d1a4befb7776dabbbca9e201ac11079e04fca6a27d19d679a4a6e2105a43ef0fd46c
-
SSDEEP
24576:vyxJ1c+m8HQzsPmc0/e0zNu3BoIzHmX08WbmkIlJl:61FmiyCdAe0Zux3zGXEbnIlJ
Static task
static1
Behavioral task
behavioral1
Sample
bff00e025f4b5bfe5d512e55768d96a6440d7f921af4e526475439f25ae4fde4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
musor
185.161.248.25:4132
-
auth_value
b044e31277d21cb0a56d9461e5e741d5
Targets
-
-
Target
bff00e025f4b5bfe5d512e55768d96a6440d7f921af4e526475439f25ae4fde4
-
Size
1.0MB
-
MD5
dd143d27043a8f54ac27735fd26504d2
-
SHA1
b5de1768a916fc4c3fd261a4a43cd212c4c8c789
-
SHA256
bff00e025f4b5bfe5d512e55768d96a6440d7f921af4e526475439f25ae4fde4
-
SHA512
57b538e8dd791678850a696df3a506a20fa3f897e3dcf61c21e2bdc1d6f6d1a4befb7776dabbbca9e201ac11079e04fca6a27d19d679a4a6e2105a43ef0fd46c
-
SSDEEP
24576:vyxJ1c+m8HQzsPmc0/e0zNu3BoIzHmX08WbmkIlJl:61FmiyCdAe0Zux3zGXEbnIlJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-