General
-
Target
7c32c112ddebd258c1b1e10f8ef1ace4e90d5840191b90478d9efa23d8881644
-
Size
1020KB
-
Sample
230519-wq3gnafb47
-
MD5
a1e59c770f0d8bfab524b43c3f7e5476
-
SHA1
e82b213235f0c5bbea82a033a09444c10e8909e4
-
SHA256
7c32c112ddebd258c1b1e10f8ef1ace4e90d5840191b90478d9efa23d8881644
-
SHA512
88682432a2e95839fcba0c7a2072022a7aa0edd54cec18bf303207b8d33406a7952cb299897dee8f5fcd814dd784ff30662262fa2131de0f526177d37606b766
-
SSDEEP
24576:Vy5ITbEOycetniL89kjc2/+qCjsnDT6Twb:w5eretn/9ecONfP
Static task
static1
Behavioral task
behavioral1
Sample
7c32c112ddebd258c1b1e10f8ef1ace4e90d5840191b90478d9efa23d8881644.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
7c32c112ddebd258c1b1e10f8ef1ace4e90d5840191b90478d9efa23d8881644
-
Size
1020KB
-
MD5
a1e59c770f0d8bfab524b43c3f7e5476
-
SHA1
e82b213235f0c5bbea82a033a09444c10e8909e4
-
SHA256
7c32c112ddebd258c1b1e10f8ef1ace4e90d5840191b90478d9efa23d8881644
-
SHA512
88682432a2e95839fcba0c7a2072022a7aa0edd54cec18bf303207b8d33406a7952cb299897dee8f5fcd814dd784ff30662262fa2131de0f526177d37606b766
-
SSDEEP
24576:Vy5ITbEOycetniL89kjc2/+qCjsnDT6Twb:w5eretn/9ecONfP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-