General
-
Target
205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5
-
Size
1.0MB
-
Sample
230519-bjcbnsed43
-
MD5
38621716539a7cd4804e75efb3113530
-
SHA1
f6c713ec034eba618b377c219bccc18afc5e5ed1
-
SHA256
205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5
-
SHA512
f803047788a956d7fdbea1cd9ab0ee653f17880dc94a5a003bf208da7740c2e01b8e057fe01816c0adb16e693b5f29e2bc99c671704b4462050d73f5a3e58ed4
-
SSDEEP
24576:pyUSzqjtxH1SN4+hGAagt0NiCEaApBQq9jO0Y:cUS+3H1vSGot0NIaA9
Static task
static1
Behavioral task
behavioral1
Sample
205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dolz
77.91.68.253:41783
-
auth_value
91a052e7685b96dcfc2defe95d9affb8
Targets
-
-
Target
205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5
-
Size
1.0MB
-
MD5
38621716539a7cd4804e75efb3113530
-
SHA1
f6c713ec034eba618b377c219bccc18afc5e5ed1
-
SHA256
205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5
-
SHA512
f803047788a956d7fdbea1cd9ab0ee653f17880dc94a5a003bf208da7740c2e01b8e057fe01816c0adb16e693b5f29e2bc99c671704b4462050d73f5a3e58ed4
-
SSDEEP
24576:pyUSzqjtxH1SN4+hGAagt0NiCEaApBQq9jO0Y:cUS+3H1vSGot0NIaA9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-