General
-
Target
b92a6fb28a4a073273ba1429ed324d0188606a38a3b6ea6b2fa1eda46083daf4
-
Size
1.0MB
-
Sample
230519-yjyagafg87
-
MD5
ab915de0de89832813506d4dc2b7de7b
-
SHA1
61365871fdf35251651f92b9620be277e966d928
-
SHA256
b92a6fb28a4a073273ba1429ed324d0188606a38a3b6ea6b2fa1eda46083daf4
-
SHA512
98cdce6314558912b34dca8884b9fdc51d0f88f03732bc1bfeec617f80488e58482526f1f67e14b2f92593a716066f13d20d1e351d4f0f07db0d270f58cbfbc0
-
SSDEEP
24576:1yxkEWQPjn365PFRFA31Glr1n3/lIDi2E3vqnxNTheH:Qxkmr3IFA32tvKt4vqxNTY
Static task
static1
Behavioral task
behavioral1
Sample
b92a6fb28a4a073273ba1429ed324d0188606a38a3b6ea6b2fa1eda46083daf4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
b92a6fb28a4a073273ba1429ed324d0188606a38a3b6ea6b2fa1eda46083daf4
-
Size
1.0MB
-
MD5
ab915de0de89832813506d4dc2b7de7b
-
SHA1
61365871fdf35251651f92b9620be277e966d928
-
SHA256
b92a6fb28a4a073273ba1429ed324d0188606a38a3b6ea6b2fa1eda46083daf4
-
SHA512
98cdce6314558912b34dca8884b9fdc51d0f88f03732bc1bfeec617f80488e58482526f1f67e14b2f92593a716066f13d20d1e351d4f0f07db0d270f58cbfbc0
-
SSDEEP
24576:1yxkEWQPjn365PFRFA31Glr1n3/lIDi2E3vqnxNTheH:Qxkmr3IFA32tvKt4vqxNTY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-