General
-
Target
0c46adb2692d1f9e51e4cdcf9ebd606736b5f7fe8ef039b7ff88dc9546ee6394
-
Size
1.0MB
-
Sample
230519-wfanwsfa94
-
MD5
fdaf813f5b7c725a60930ea3d9832449
-
SHA1
3bf60f7733d3040e5fb037b3a7e3095a75dfef10
-
SHA256
0c46adb2692d1f9e51e4cdcf9ebd606736b5f7fe8ef039b7ff88dc9546ee6394
-
SHA512
e044de80a4f679edce53fb093d891e70d75efebf537aac27a3f2a67c732c181a9315d27894513cfb686e92988bb89cd671a6d13fd370839f9a94c352fd9ad8aa
-
SSDEEP
24576:myHK53WAzztwq0tDRw3Ry4WVY7nWH1AKmzbnREnyNs:1I3WOZwZdR0VWwWVAKmPnRL
Static task
static1
Behavioral task
behavioral1
Sample
0c46adb2692d1f9e51e4cdcf9ebd606736b5f7fe8ef039b7ff88dc9546ee6394.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
0c46adb2692d1f9e51e4cdcf9ebd606736b5f7fe8ef039b7ff88dc9546ee6394
-
Size
1.0MB
-
MD5
fdaf813f5b7c725a60930ea3d9832449
-
SHA1
3bf60f7733d3040e5fb037b3a7e3095a75dfef10
-
SHA256
0c46adb2692d1f9e51e4cdcf9ebd606736b5f7fe8ef039b7ff88dc9546ee6394
-
SHA512
e044de80a4f679edce53fb093d891e70d75efebf537aac27a3f2a67c732c181a9315d27894513cfb686e92988bb89cd671a6d13fd370839f9a94c352fd9ad8aa
-
SSDEEP
24576:myHK53WAzztwq0tDRw3Ry4WVY7nWH1AKmzbnREnyNs:1I3WOZwZdR0VWwWVAKmPnRL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-