General
-
Target
dd34b02a55f70caedd60acb4d06eea6e7c457289ea96b252c9114c47fe62a16b
-
Size
1021KB
-
Sample
230519-cnbrdade5t
-
MD5
909fa305be6e6e1880718e68d7f1ecec
-
SHA1
6bd8bf11c9e3f552aca22a1f84d43fbd6ddceef9
-
SHA256
dd34b02a55f70caedd60acb4d06eea6e7c457289ea96b252c9114c47fe62a16b
-
SHA512
46e7fa0fa80f1d3d526c0ac48e915d323e72258444ceb59bf47fef11df0c4dae0e3eeff399bb24e1e628c547365b55364f008bcaec0420ce7fc8674fa6f0916f
-
SSDEEP
24576:nyUtu74LviWpwIbqfBaFJsID0DT4z1fJ7skTlA2kwIp:yUCX+bfFJsFYxxhA2k
Static task
static1
Behavioral task
behavioral1
Sample
dd34b02a55f70caedd60acb4d06eea6e7c457289ea96b252c9114c47fe62a16b.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dolz
77.91.68.253:41783
-
auth_value
91a052e7685b96dcfc2defe95d9affb8
Targets
-
-
Target
dd34b02a55f70caedd60acb4d06eea6e7c457289ea96b252c9114c47fe62a16b
-
Size
1021KB
-
MD5
909fa305be6e6e1880718e68d7f1ecec
-
SHA1
6bd8bf11c9e3f552aca22a1f84d43fbd6ddceef9
-
SHA256
dd34b02a55f70caedd60acb4d06eea6e7c457289ea96b252c9114c47fe62a16b
-
SHA512
46e7fa0fa80f1d3d526c0ac48e915d323e72258444ceb59bf47fef11df0c4dae0e3eeff399bb24e1e628c547365b55364f008bcaec0420ce7fc8674fa6f0916f
-
SSDEEP
24576:nyUtu74LviWpwIbqfBaFJsID0DT4z1fJ7skTlA2kwIp:yUCX+bfFJsFYxxhA2k
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-