General
-
Target
a4ab4024897280799ffdde3ee0a64db239b76c6c45921a07d48cab961792240c
-
Size
1.0MB
-
Sample
230519-r29b5aec79
-
MD5
19c70eecdbec32466731d7c0e8a862bb
-
SHA1
44c0249fdf5fbcf41e29089cfae2f921adcdd0ea
-
SHA256
a4ab4024897280799ffdde3ee0a64db239b76c6c45921a07d48cab961792240c
-
SHA512
aa947a776479e6c24dbfc2ca12bc55c7437d9fa7b32884b60b32d6cc6c21896b52d42a6541eedc8c711d5655a6f15ba449de95cde7b28e55fad1c53e16a2dd50
-
SSDEEP
24576:8yGkLJCn4OBKZqw6AjGxqFNgNk9RlxGB+JVBT3ZrZuLK:rVFCoZqwZHNga9RTGmVBT3ZrQ
Static task
static1
Behavioral task
behavioral1
Sample
a4ab4024897280799ffdde3ee0a64db239b76c6c45921a07d48cab961792240c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
a4ab4024897280799ffdde3ee0a64db239b76c6c45921a07d48cab961792240c
-
Size
1.0MB
-
MD5
19c70eecdbec32466731d7c0e8a862bb
-
SHA1
44c0249fdf5fbcf41e29089cfae2f921adcdd0ea
-
SHA256
a4ab4024897280799ffdde3ee0a64db239b76c6c45921a07d48cab961792240c
-
SHA512
aa947a776479e6c24dbfc2ca12bc55c7437d9fa7b32884b60b32d6cc6c21896b52d42a6541eedc8c711d5655a6f15ba449de95cde7b28e55fad1c53e16a2dd50
-
SSDEEP
24576:8yGkLJCn4OBKZqw6AjGxqFNgNk9RlxGB+JVBT3ZrZuLK:rVFCoZqwZHNga9RTGmVBT3ZrQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-