General
-
Target
db0ae9f6b006f4a5ca07821cf161bb455dc58c935447f16cd76a3d1da752e8f8
-
Size
1.0MB
-
Sample
230518-raqeyaba5v
-
MD5
dd00f6cc47b24722ed2d0b5e4173a37d
-
SHA1
fe2b2372ca8d3434a51f17cca73a91987576c867
-
SHA256
db0ae9f6b006f4a5ca07821cf161bb455dc58c935447f16cd76a3d1da752e8f8
-
SHA512
c19ad26672456c3847dd6e383897ea66083c94c83fb04f808064d6f4c5eda839f7b415a19416d90753843ed778052abddd27f044a244bc275f565a39f883b3a0
-
SSDEEP
24576:FyF26yLLHh68KuIBWpcB3ayjY4QIML5TI/IQeMGq:gFwLB/KuUWpcJxj+8Iv
Static task
static1
Behavioral task
behavioral1
Sample
db0ae9f6b006f4a5ca07821cf161bb455dc58c935447f16cd76a3d1da752e8f8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db0ae9f6b006f4a5ca07821cf161bb455dc58c935447f16cd76a3d1da752e8f8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dream
77.91.68.253:4138
-
auth_value
7b4f26a4ca794e30cee1032d5cb62f5c
Targets
-
-
Target
db0ae9f6b006f4a5ca07821cf161bb455dc58c935447f16cd76a3d1da752e8f8
-
Size
1.0MB
-
MD5
dd00f6cc47b24722ed2d0b5e4173a37d
-
SHA1
fe2b2372ca8d3434a51f17cca73a91987576c867
-
SHA256
db0ae9f6b006f4a5ca07821cf161bb455dc58c935447f16cd76a3d1da752e8f8
-
SHA512
c19ad26672456c3847dd6e383897ea66083c94c83fb04f808064d6f4c5eda839f7b415a19416d90753843ed778052abddd27f044a244bc275f565a39f883b3a0
-
SSDEEP
24576:FyF26yLLHh68KuIBWpcB3ayjY4QIML5TI/IQeMGq:gFwLB/KuUWpcJxj+8Iv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-