General
-
Target
translator.dll.exe
-
Size
1.0MB
-
Sample
230518-rjed2abc8v
-
MD5
4f1a146748c49b6510d9fd4799ee8911
-
SHA1
1beeab0d7baad385a6ab5db0741041716f1dd711
-
SHA256
d3141f75c170bdad43c1888af54ff09eff1abe45372757ae99ce70baffa4ff9f
-
SHA512
37d605325eb365c89c8ae68955b35b78e67a19a3acdcf34b1a0e723063ea1326c3bda4ab377849c2771fc5627a8bc5ae6b7dafd098a363059958954486f80450
-
SSDEEP
12288:VMrIy90FO3Nc8LjHKNuyzgZxNAY1fWUD1Dt6FplORGvVIb2Jtwef0xeVRBWKqUDw:FyaO3NzjrysJ1f5DrO4z2Dx9WK9bW5
Static task
static1
Behavioral task
behavioral1
Sample
translator.dll.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
translator.dll.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
luna
77.91.68.253:4138
-
auth_value
16dec8addb01db1c11c59667022ef7a2
Targets
-
-
Target
translator.dll.exe
-
Size
1.0MB
-
MD5
4f1a146748c49b6510d9fd4799ee8911
-
SHA1
1beeab0d7baad385a6ab5db0741041716f1dd711
-
SHA256
d3141f75c170bdad43c1888af54ff09eff1abe45372757ae99ce70baffa4ff9f
-
SHA512
37d605325eb365c89c8ae68955b35b78e67a19a3acdcf34b1a0e723063ea1326c3bda4ab377849c2771fc5627a8bc5ae6b7dafd098a363059958954486f80450
-
SSDEEP
12288:VMrIy90FO3Nc8LjHKNuyzgZxNAY1fWUD1Dt6FplORGvVIb2Jtwef0xeVRBWKqUDw:FyaO3NzjrysJ1f5DrO4z2Dx9WK9bW5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-