General
-
Target
2c54d58c6ffd6fdd86c1dd862859f04df1e051c2eb36fd7d618c23e560ef3a32
-
Size
1022KB
-
Sample
230520-3l7n5shg9s
-
MD5
1393045e904e44e2e23c981172fde771
-
SHA1
6f131baac05dd209efadbab42af3084d2f039778
-
SHA256
2c54d58c6ffd6fdd86c1dd862859f04df1e051c2eb36fd7d618c23e560ef3a32
-
SHA512
cc5148e7f1c6731a849eedb6a362af21871c4a02ac6c578bbbf7d3543a57918c52c33c62ae6db50735f76519fcbed139e17113f8f75ea801f513f7d0573ccdb3
-
SSDEEP
24576:xy4baEY7AkaV5sVTaAJ95USjpfyf4xi9UgjIClT:kMab7AkansVTai95Lpfy2i9Uxm
Static task
static1
Behavioral task
behavioral1
Sample
2c54d58c6ffd6fdd86c1dd862859f04df1e051c2eb36fd7d618c23e560ef3a32.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
2c54d58c6ffd6fdd86c1dd862859f04df1e051c2eb36fd7d618c23e560ef3a32
-
Size
1022KB
-
MD5
1393045e904e44e2e23c981172fde771
-
SHA1
6f131baac05dd209efadbab42af3084d2f039778
-
SHA256
2c54d58c6ffd6fdd86c1dd862859f04df1e051c2eb36fd7d618c23e560ef3a32
-
SHA512
cc5148e7f1c6731a849eedb6a362af21871c4a02ac6c578bbbf7d3543a57918c52c33c62ae6db50735f76519fcbed139e17113f8f75ea801f513f7d0573ccdb3
-
SSDEEP
24576:xy4baEY7AkaV5sVTaAJ95USjpfyf4xi9UgjIClT:kMab7AkansVTai95Lpfy2i9Uxm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-