General
-
Target
de20ae3fec314baf6030f748b01a97c74081cc1b0ab899cb9de965613b492f92
-
Size
1.0MB
-
Sample
230517-ggnjtadh36
-
MD5
c28d12b26c13fef2da07329ac8aa5c54
-
SHA1
3a78437bbd4c8d5f17e7aec9c4ea0b66d3329301
-
SHA256
de20ae3fec314baf6030f748b01a97c74081cc1b0ab899cb9de965613b492f92
-
SHA512
aa8f7df3890650f44eff6218a597b4da6e12888cadc63d4e504b4c34bbbf3555318da967a191b650d1cafaf5d6090ba8aac427020931505ca29b7af4a0cf118b
-
SSDEEP
24576:0y33Ct4dtzFgTPub63YB1JDeuzufSI+R9lHGTv7Qh9PGx:D3SQSuIGbe9fQ9lmTvch9u
Static task
static1
Behavioral task
behavioral1
Sample
de20ae3fec314baf6030f748b01a97c74081cc1b0ab899cb9de965613b492f92.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
musor
185.161.248.25:4132
-
auth_value
b044e31277d21cb0a56d9461e5e741d5
Targets
-
-
Target
de20ae3fec314baf6030f748b01a97c74081cc1b0ab899cb9de965613b492f92
-
Size
1.0MB
-
MD5
c28d12b26c13fef2da07329ac8aa5c54
-
SHA1
3a78437bbd4c8d5f17e7aec9c4ea0b66d3329301
-
SHA256
de20ae3fec314baf6030f748b01a97c74081cc1b0ab899cb9de965613b492f92
-
SHA512
aa8f7df3890650f44eff6218a597b4da6e12888cadc63d4e504b4c34bbbf3555318da967a191b650d1cafaf5d6090ba8aac427020931505ca29b7af4a0cf118b
-
SSDEEP
24576:0y33Ct4dtzFgTPub63YB1JDeuzufSI+R9lHGTv7Qh9PGx:D3SQSuIGbe9fQ9lmTvch9u
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-