General
-
Target
489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28
-
Size
1.0MB
-
Sample
230519-ay768adb7z
-
MD5
ca8263b7f31da872fddb20e30c51a893
-
SHA1
79ef3c4ba91f2ae08b545c3b85246dd463aa1308
-
SHA256
489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28
-
SHA512
bda679875f4b25c591c55dd849ed6165395dae2b27855df92b05e2bab47d8ca44d2baaf67f4c763b6eecd964f4950d01f40453a76bd55451434a1a3e5d6d04f4
-
SSDEEP
24576:Ny3iFkoLm4oh1Awt5rmvSo+aEgfsR9nH4T+:o30/5s19HrmvSCEi+1Y
Static task
static1
Behavioral task
behavioral1
Sample
489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dolz
77.91.68.253:41783
-
auth_value
91a052e7685b96dcfc2defe95d9affb8
Targets
-
-
Target
489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28
-
Size
1.0MB
-
MD5
ca8263b7f31da872fddb20e30c51a893
-
SHA1
79ef3c4ba91f2ae08b545c3b85246dd463aa1308
-
SHA256
489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28
-
SHA512
bda679875f4b25c591c55dd849ed6165395dae2b27855df92b05e2bab47d8ca44d2baaf67f4c763b6eecd964f4950d01f40453a76bd55451434a1a3e5d6d04f4
-
SSDEEP
24576:Ny3iFkoLm4oh1Awt5rmvSo+aEgfsR9nH4T+:o30/5s19HrmvSCEi+1Y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-