General
-
Target
a64332837a7834d7b0679feaebf4c8988af261c10de78c8d9b7b3efe0db75c28
-
Size
1.0MB
-
Sample
230518-q7w4babh68
-
MD5
28bb4144242924b5886029e989b365ef
-
SHA1
39784ffed7fed2a696c18fa0e2d7ec8a645318ab
-
SHA256
a64332837a7834d7b0679feaebf4c8988af261c10de78c8d9b7b3efe0db75c28
-
SHA512
ae9e4332f08aafac2a157f7c848e1cf1fdb3076e902e617882f987be403cf86ca209ac17f36651549f2979e737b6f95cf88ec9bf5f768aeb08ca23fed4b728ba
-
SSDEEP
24576:lyaXtA5T1+Cfhl8eKMlkXYRNlbgbE5+OPdFXe7DkWR:Aa9A5T1+CZWeKXXY9bgc+OPdF
Static task
static1
Behavioral task
behavioral1
Sample
a64332837a7834d7b0679feaebf4c8988af261c10de78c8d9b7b3efe0db75c28.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a64332837a7834d7b0679feaebf4c8988af261c10de78c8d9b7b3efe0db75c28.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dream
77.91.68.253:4138
-
auth_value
7b4f26a4ca794e30cee1032d5cb62f5c
Targets
-
-
Target
a64332837a7834d7b0679feaebf4c8988af261c10de78c8d9b7b3efe0db75c28
-
Size
1.0MB
-
MD5
28bb4144242924b5886029e989b365ef
-
SHA1
39784ffed7fed2a696c18fa0e2d7ec8a645318ab
-
SHA256
a64332837a7834d7b0679feaebf4c8988af261c10de78c8d9b7b3efe0db75c28
-
SHA512
ae9e4332f08aafac2a157f7c848e1cf1fdb3076e902e617882f987be403cf86ca209ac17f36651549f2979e737b6f95cf88ec9bf5f768aeb08ca23fed4b728ba
-
SSDEEP
24576:lyaXtA5T1+Cfhl8eKMlkXYRNlbgbE5+OPdFXe7DkWR:Aa9A5T1+CZWeKXXY9bgc+OPdF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-