General
-
Target
81395bcae87f4184640dc7d702a524f3.exe
-
Size
1020KB
-
Sample
230518-wmew7acb81
-
MD5
81395bcae87f4184640dc7d702a524f3
-
SHA1
0294a00c2a5dd8429604a6f3b7a6dbda0cc400e2
-
SHA256
eeae25c314c452a030203eee19215af179e341743138117de96b2b8cefd57fbe
-
SHA512
fc2aa4c4096b1baad9c263d9b377f2d1f13e17df02d4eddc856b50c3fce7e33dc72b3a50c8e50b7142c83dbc456b788171b340f6a859581674693af43dac5018
-
SSDEEP
24576:ZyyZfgKbETZkyOEGVMFzQ+O3n1lPjkgAYd3:MyZd1yOE6MBQ+cXPjkgAYd
Static task
static1
Behavioral task
behavioral1
Sample
81395bcae87f4184640dc7d702a524f3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
81395bcae87f4184640dc7d702a524f3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
laxak
77.91.68.253:41783
-
auth_value
9f2cf0f93f412b5c2e152400023c0fc3
Targets
-
-
Target
81395bcae87f4184640dc7d702a524f3.exe
-
Size
1020KB
-
MD5
81395bcae87f4184640dc7d702a524f3
-
SHA1
0294a00c2a5dd8429604a6f3b7a6dbda0cc400e2
-
SHA256
eeae25c314c452a030203eee19215af179e341743138117de96b2b8cefd57fbe
-
SHA512
fc2aa4c4096b1baad9c263d9b377f2d1f13e17df02d4eddc856b50c3fce7e33dc72b3a50c8e50b7142c83dbc456b788171b340f6a859581674693af43dac5018
-
SSDEEP
24576:ZyyZfgKbETZkyOEGVMFzQ+O3n1lPjkgAYd3:MyZd1yOE6MBQ+cXPjkgAYd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-