General
-
Target
6449052bd836cabffc205ebc81a021f5c55e0290d9fb2a39ccf7751346557f4f
-
Size
1.0MB
-
Sample
230519-af5y5sdb3x
-
MD5
74d5a7c002fd36a71818c01db6ab5b6e
-
SHA1
7c29b10ea11460753a9ded2dc13cb23c71842d4f
-
SHA256
6449052bd836cabffc205ebc81a021f5c55e0290d9fb2a39ccf7751346557f4f
-
SHA512
5ff9fec1c4be715eaacbc759bb508f8b5d006f7fd3b21a9872467709f8b7104f3eb573dcb4ee6df9cb5a5f49aea53fd6c505f04837d4019d05badbca37a34843
-
SSDEEP
24576:TyT/k2EgrurhwALee3ovu4o3FvoX+tZ4TyZCvHKU:mQ2Egru9wUe/dKt+TyZC/
Static task
static1
Behavioral task
behavioral1
Sample
6449052bd836cabffc205ebc81a021f5c55e0290d9fb2a39ccf7751346557f4f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dolz
77.91.68.253:41783
-
auth_value
91a052e7685b96dcfc2defe95d9affb8
Targets
-
-
Target
6449052bd836cabffc205ebc81a021f5c55e0290d9fb2a39ccf7751346557f4f
-
Size
1.0MB
-
MD5
74d5a7c002fd36a71818c01db6ab5b6e
-
SHA1
7c29b10ea11460753a9ded2dc13cb23c71842d4f
-
SHA256
6449052bd836cabffc205ebc81a021f5c55e0290d9fb2a39ccf7751346557f4f
-
SHA512
5ff9fec1c4be715eaacbc759bb508f8b5d006f7fd3b21a9872467709f8b7104f3eb573dcb4ee6df9cb5a5f49aea53fd6c505f04837d4019d05badbca37a34843
-
SSDEEP
24576:TyT/k2EgrurhwALee3ovu4o3FvoX+tZ4TyZCvHKU:mQ2Egru9wUe/dKt+TyZC/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-