General
-
Target
f52d6f0edd65295f97ef8e52a5d881bd2596cc7f7d4861d71b5408ae5b35a9a5
-
Size
1021KB
-
Sample
230519-gjw9qsfc75
-
MD5
c58334a719b7ee0bd6f04c7da221b804
-
SHA1
1b5354ff6ab82f89738b57dc0d64492fdbd0f2cf
-
SHA256
f52d6f0edd65295f97ef8e52a5d881bd2596cc7f7d4861d71b5408ae5b35a9a5
-
SHA512
9a21d7be629bf61af886ae92708dcb407eaeee03f8eb3a28168617cba51ef4f5f8bdebbe20d2b7eb2844c99beb2869b5995f6b19173e574cf8e661743b51e792
-
SSDEEP
24576:WyPV3TV08bEDI1SVWz7hj0k31rD3lPZpqsBA6FUm:lPRTVvTSVWz7Wk35D3TIsBA6F
Static task
static1
Behavioral task
behavioral1
Sample
f52d6f0edd65295f97ef8e52a5d881bd2596cc7f7d4861d71b5408ae5b35a9a5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mols
77.91.68.253:41783
-
auth_value
a4802ffb2e6c2a918243481cbc165a32
Targets
-
-
Target
f52d6f0edd65295f97ef8e52a5d881bd2596cc7f7d4861d71b5408ae5b35a9a5
-
Size
1021KB
-
MD5
c58334a719b7ee0bd6f04c7da221b804
-
SHA1
1b5354ff6ab82f89738b57dc0d64492fdbd0f2cf
-
SHA256
f52d6f0edd65295f97ef8e52a5d881bd2596cc7f7d4861d71b5408ae5b35a9a5
-
SHA512
9a21d7be629bf61af886ae92708dcb407eaeee03f8eb3a28168617cba51ef4f5f8bdebbe20d2b7eb2844c99beb2869b5995f6b19173e574cf8e661743b51e792
-
SSDEEP
24576:WyPV3TV08bEDI1SVWz7hj0k31rD3lPZpqsBA6FUm:lPRTVvTSVWz7Wk35D3TIsBA6F
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-