General
-
Target
920da3a38860b3a3dc5abfe1878ece419365be673cf4aa4428a84436965bba56
-
Size
1.0MB
-
Sample
230519-sqkp3aed84
-
MD5
fe6debbabcc97ab8fab0cea9231786e5
-
SHA1
cf6f326864fcb49e0b833b37e5ea776d1d0fa361
-
SHA256
920da3a38860b3a3dc5abfe1878ece419365be673cf4aa4428a84436965bba56
-
SHA512
6b76f76d01a38473f023919b9181445741bb5d09b83f5870117e68a909d6de4867bd0cf73e15ef4470de6ea29c65a64e6231d057db5e10fd1271b22d1a617c59
-
SSDEEP
24576:0yBctSjRnimi3uJUTLKofFOL/v8zVffKIxJyhG:DKtSjD6LKofFAi8
Static task
static1
Behavioral task
behavioral1
Sample
920da3a38860b3a3dc5abfe1878ece419365be673cf4aa4428a84436965bba56.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
920da3a38860b3a3dc5abfe1878ece419365be673cf4aa4428a84436965bba56
-
Size
1.0MB
-
MD5
fe6debbabcc97ab8fab0cea9231786e5
-
SHA1
cf6f326864fcb49e0b833b37e5ea776d1d0fa361
-
SHA256
920da3a38860b3a3dc5abfe1878ece419365be673cf4aa4428a84436965bba56
-
SHA512
6b76f76d01a38473f023919b9181445741bb5d09b83f5870117e68a909d6de4867bd0cf73e15ef4470de6ea29c65a64e6231d057db5e10fd1271b22d1a617c59
-
SSDEEP
24576:0yBctSjRnimi3uJUTLKofFOL/v8zVffKIxJyhG:DKtSjD6LKofFAi8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-