General
-
Target
df9fcdd73be0b7d20ed5f288257dcf342a789907894ee66c77fc0e0928fe9d52.exe
-
Size
1.0MB
-
Sample
230518-re3wtsbb9y
-
MD5
5b2e8ab537b17003c1ef380926661a6a
-
SHA1
512958dfd39e35bc4a723a668fcb8e7d937c5dfa
-
SHA256
df9fcdd73be0b7d20ed5f288257dcf342a789907894ee66c77fc0e0928fe9d52
-
SHA512
a53fa87a0c7a739052ee41a843d1d7242df772fddc53257a6587a61b2b24f4a95b1a26d297b92645f774bfba3746fcc1bb8b65875efcc3a7dfa1428661decd0b
-
SSDEEP
24576:fyWIarJs4aiosUuKpFt0i+MBpca/zVh73FQwBhR3:qWBJsnjSa/zV5dzR
Static task
static1
Behavioral task
behavioral1
Sample
df9fcdd73be0b7d20ed5f288257dcf342a789907894ee66c77fc0e0928fe9d52.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
df9fcdd73be0b7d20ed5f288257dcf342a789907894ee66c77fc0e0928fe9d52.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
luna
77.91.68.253:4138
-
auth_value
16dec8addb01db1c11c59667022ef7a2
Targets
-
-
Target
df9fcdd73be0b7d20ed5f288257dcf342a789907894ee66c77fc0e0928fe9d52.exe
-
Size
1.0MB
-
MD5
5b2e8ab537b17003c1ef380926661a6a
-
SHA1
512958dfd39e35bc4a723a668fcb8e7d937c5dfa
-
SHA256
df9fcdd73be0b7d20ed5f288257dcf342a789907894ee66c77fc0e0928fe9d52
-
SHA512
a53fa87a0c7a739052ee41a843d1d7242df772fddc53257a6587a61b2b24f4a95b1a26d297b92645f774bfba3746fcc1bb8b65875efcc3a7dfa1428661decd0b
-
SSDEEP
24576:fyWIarJs4aiosUuKpFt0i+MBpca/zVh73FQwBhR3:qWBJsnjSa/zV5dzR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-