General
-
Target
d7a348018704c681a5b706313440d081.exe
-
Size
1021KB
-
Sample
230520-1d86wshd61
-
MD5
d7a348018704c681a5b706313440d081
-
SHA1
21d53b237d9cac972ae8b9ccfe8454e4d77b3902
-
SHA256
141be433bcb78f4b0460c5f4f1e133d08f236ab8a5ecd0b047ef2b6f85d50173
-
SHA512
9788f34acc743187434cab8a3bd2576a704a4f270eed3fe15687c57f3eef14b1512777e88423bd8ca9ac11a26b18ade344661dee2547c41ee62f8fba283dce82
-
SSDEEP
24576:UyXdEq3Tj7BvjqfA2008oEFUk19dJxvbivhfLw38c33NUE:jXx3Tj7RjqR00j+d19r4ZDw3da
Static task
static1
Behavioral task
behavioral1
Sample
d7a348018704c681a5b706313440d081.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d7a348018704c681a5b706313440d081.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
laza
77.91.124.251:19065
-
auth_value
c5e3b769b3929b25aad5a26e2354ccb9
Targets
-
-
Target
d7a348018704c681a5b706313440d081.exe
-
Size
1021KB
-
MD5
d7a348018704c681a5b706313440d081
-
SHA1
21d53b237d9cac972ae8b9ccfe8454e4d77b3902
-
SHA256
141be433bcb78f4b0460c5f4f1e133d08f236ab8a5ecd0b047ef2b6f85d50173
-
SHA512
9788f34acc743187434cab8a3bd2576a704a4f270eed3fe15687c57f3eef14b1512777e88423bd8ca9ac11a26b18ade344661dee2547c41ee62f8fba283dce82
-
SSDEEP
24576:UyXdEq3Tj7BvjqfA2008oEFUk19dJxvbivhfLw38c33NUE:jXx3Tj7RjqR00j+d19r4ZDw3da
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-