General
-
Target
656b3f00dfea4ebcf12f622be34ed7276e5a3eb5ad0147c42cd6b4ae979ec5c0
-
Size
1.0MB
-
Sample
230517-k95wcade3z
-
MD5
cd95eb3cb1dedffb267a95f054ed2cf0
-
SHA1
9ac3da2bcb73073033ceddf89a634f2c11b2c96b
-
SHA256
656b3f00dfea4ebcf12f622be34ed7276e5a3eb5ad0147c42cd6b4ae979ec5c0
-
SHA512
445b2b393528aac44a7b65501659c1c81b25e8355141402c48585cb75c70b821499ff96677639ca8259bf56066868b042530da70e251016812045c0cb671be57
-
SSDEEP
24576:GyP/AP3ylA2cfvKYM5MlI+mS11Ge7fEfTwUtJe:V3xlJAv1tl1Qe7QTwU
Static task
static1
Behavioral task
behavioral1
Sample
656b3f00dfea4ebcf12f622be34ed7276e5a3eb5ad0147c42cd6b4ae979ec5c0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
musor
185.161.248.25:4132
-
auth_value
b044e31277d21cb0a56d9461e5e741d5
Targets
-
-
Target
656b3f00dfea4ebcf12f622be34ed7276e5a3eb5ad0147c42cd6b4ae979ec5c0
-
Size
1.0MB
-
MD5
cd95eb3cb1dedffb267a95f054ed2cf0
-
SHA1
9ac3da2bcb73073033ceddf89a634f2c11b2c96b
-
SHA256
656b3f00dfea4ebcf12f622be34ed7276e5a3eb5ad0147c42cd6b4ae979ec5c0
-
SHA512
445b2b393528aac44a7b65501659c1c81b25e8355141402c48585cb75c70b821499ff96677639ca8259bf56066868b042530da70e251016812045c0cb671be57
-
SSDEEP
24576:GyP/AP3ylA2cfvKYM5MlI+mS11Ge7fEfTwUtJe:V3xlJAv1tl1Qe7QTwU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-