General
-
Target
5b6d84232bde3e2f851ff519556b53626b848a9bbb048e2e0aa5e277b51084c4
-
Size
1.0MB
-
Sample
230517-kxl8gaed53
-
MD5
02296a053ab43e9611963d706b5ae55b
-
SHA1
6fb1a3a29af3d4a81c64767c9b06fb0d243c4592
-
SHA256
5b6d84232bde3e2f851ff519556b53626b848a9bbb048e2e0aa5e277b51084c4
-
SHA512
2c96dd2b68f5b4f717da65a051b93b69e2c4c0eb18422d1fac4990626b934e76f417a444f6dc48dd95b6fa160622620eab9a795ce052a925f53582c23ad8269f
-
SSDEEP
24576:Iyp3M6sKZ6UtASacmNHQpeXONzzccTKsgXAg9bwO/Gv8HcPCVpJm4:PpV13tA5NHyiONHcqKsgSScW7
Static task
static1
Behavioral task
behavioral1
Sample
5b6d84232bde3e2f851ff519556b53626b848a9bbb048e2e0aa5e277b51084c4.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
musor
185.161.248.25:4132
-
auth_value
b044e31277d21cb0a56d9461e5e741d5
Targets
-
-
Target
5b6d84232bde3e2f851ff519556b53626b848a9bbb048e2e0aa5e277b51084c4
-
Size
1.0MB
-
MD5
02296a053ab43e9611963d706b5ae55b
-
SHA1
6fb1a3a29af3d4a81c64767c9b06fb0d243c4592
-
SHA256
5b6d84232bde3e2f851ff519556b53626b848a9bbb048e2e0aa5e277b51084c4
-
SHA512
2c96dd2b68f5b4f717da65a051b93b69e2c4c0eb18422d1fac4990626b934e76f417a444f6dc48dd95b6fa160622620eab9a795ce052a925f53582c23ad8269f
-
SSDEEP
24576:Iyp3M6sKZ6UtASacmNHQpeXONzzccTKsgXAg9bwO/Gv8HcPCVpJm4:PpV13tA5NHyiONHcqKsgSScW7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-