General
-
Target
d1760389b88d25a81155092b1e83e5d674a1e11257276bc8fce720fd62320c58
-
Size
1020KB
-
Sample
230519-vdn8tshe7x
-
MD5
483e75e2927d6d22aa662bf18f7994ba
-
SHA1
26fcb4e58113254b495ebcc52f3048378958015f
-
SHA256
d1760389b88d25a81155092b1e83e5d674a1e11257276bc8fce720fd62320c58
-
SHA512
fd7f9bab4b443e2ec442702af29024faffddbc2a0886fc321aed594a97e7088413ac7aea39a4fdf9bd6256e3a2ffa945cf86d18fab3c525d9e680a02cf8650e7
-
SSDEEP
24576:kyBTuTAA1bqf1LN8MFRBe9yQoE/CuYuruHZTU0v:zVukA1EN8MFR+noAprcZT
Static task
static1
Behavioral task
behavioral1
Sample
d1760389b88d25a81155092b1e83e5d674a1e11257276bc8fce720fd62320c58.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
luper
77.91.68.253:19065
-
auth_value
474f8e2f629b7bc1a8c7ea1dc39ca043
Targets
-
-
Target
d1760389b88d25a81155092b1e83e5d674a1e11257276bc8fce720fd62320c58
-
Size
1020KB
-
MD5
483e75e2927d6d22aa662bf18f7994ba
-
SHA1
26fcb4e58113254b495ebcc52f3048378958015f
-
SHA256
d1760389b88d25a81155092b1e83e5d674a1e11257276bc8fce720fd62320c58
-
SHA512
fd7f9bab4b443e2ec442702af29024faffddbc2a0886fc321aed594a97e7088413ac7aea39a4fdf9bd6256e3a2ffa945cf86d18fab3c525d9e680a02cf8650e7
-
SSDEEP
24576:kyBTuTAA1bqf1LN8MFRBe9yQoE/CuYuruHZTU0v:zVukA1EN8MFR+noAprcZT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-