General
-
Target
d69327b374539777ace5b8947bfde7397d38ce79a30614cb51bd868a3e8719bc
-
Size
1.0MB
-
Sample
230519-w2c15shh9z
-
MD5
efe53ad8db7a3b0928ac612141b6ed8a
-
SHA1
709e5394986c3f11b7de7d224da85bf1c8eb62eb
-
SHA256
d69327b374539777ace5b8947bfde7397d38ce79a30614cb51bd868a3e8719bc
-
SHA512
6b15bf22d9a7e549bee88b3db04e312064ee1c24ed91fd67f7360a07c636fa0db0719746e3f6388abf56202fd4fc5ce8b77d50f5ab4e05bb237f7903aab2b1e7
-
SSDEEP
24576:CyuxSEsWPfy4d9PLJktXYJEYfFN7MV/epClF+c3wba3L:pQPq4XLJktozfFNgVewPPWa3
Static task
static1
Behavioral task
behavioral1
Sample
d69327b374539777ace5b8947bfde7397d38ce79a30614cb51bd868a3e8719bc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
d69327b374539777ace5b8947bfde7397d38ce79a30614cb51bd868a3e8719bc
-
Size
1.0MB
-
MD5
efe53ad8db7a3b0928ac612141b6ed8a
-
SHA1
709e5394986c3f11b7de7d224da85bf1c8eb62eb
-
SHA256
d69327b374539777ace5b8947bfde7397d38ce79a30614cb51bd868a3e8719bc
-
SHA512
6b15bf22d9a7e549bee88b3db04e312064ee1c24ed91fd67f7360a07c636fa0db0719746e3f6388abf56202fd4fc5ce8b77d50f5ab4e05bb237f7903aab2b1e7
-
SSDEEP
24576:CyuxSEsWPfy4d9PLJktXYJEYfFN7MV/epClF+c3wba3L:pQPq4XLJktozfFNgVewPPWa3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-