General
-
Target
a93e3e497ed2f1a464ad65a3fa22ddc2917f747d41e5073186abc0e11f451622.exe
-
Size
1.0MB
-
Sample
230518-rbrdmaba9y
-
MD5
ac5d085f6ead96711b6c7034dc0f3c5d
-
SHA1
26bb0c3e8b86b8a81166f99e89cae75eb3ef9545
-
SHA256
a93e3e497ed2f1a464ad65a3fa22ddc2917f747d41e5073186abc0e11f451622
-
SHA512
5472406c02fe32e7e0b0d78b7f7f82fa2f1b06d30797309384e31fb30fa92fd8faaf05c13a4fd627ba0203e8c5d7078e0c006eacd9ec622f81e15c3d038a86bb
-
SSDEEP
24576:iyR+Lw110EsbevpI1OALQGB0lAky7RGoa:JcLw110EiQp84/K7RG
Static task
static1
Behavioral task
behavioral1
Sample
a93e3e497ed2f1a464ad65a3fa22ddc2917f747d41e5073186abc0e11f451622.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a93e3e497ed2f1a464ad65a3fa22ddc2917f747d41e5073186abc0e11f451622.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dream
77.91.68.253:4138
-
auth_value
7b4f26a4ca794e30cee1032d5cb62f5c
Targets
-
-
Target
a93e3e497ed2f1a464ad65a3fa22ddc2917f747d41e5073186abc0e11f451622.exe
-
Size
1.0MB
-
MD5
ac5d085f6ead96711b6c7034dc0f3c5d
-
SHA1
26bb0c3e8b86b8a81166f99e89cae75eb3ef9545
-
SHA256
a93e3e497ed2f1a464ad65a3fa22ddc2917f747d41e5073186abc0e11f451622
-
SHA512
5472406c02fe32e7e0b0d78b7f7f82fa2f1b06d30797309384e31fb30fa92fd8faaf05c13a4fd627ba0203e8c5d7078e0c006eacd9ec622f81e15c3d038a86bb
-
SSDEEP
24576:iyR+Lw110EsbevpI1OALQGB0lAky7RGoa:JcLw110EiQp84/K7RG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-