General
-
Target
d0b0138d226e783b7f7ac4ad6fc0f7f5184bde835e922542952d1ab4ef3622f1
-
Size
1.0MB
-
Sample
230520-3q2npahh21
-
MD5
bebd5a64aa7e26fc33807fe5825ae036
-
SHA1
16f346093f4b8855a89c2dc28d2322a65c3db6e4
-
SHA256
d0b0138d226e783b7f7ac4ad6fc0f7f5184bde835e922542952d1ab4ef3622f1
-
SHA512
922e36f874fa44e86ff32d53f451d5ebefcde5c193c282acc726d3e6988ae17baa4d6a7947fda39d2cf524b8eddbd5fa30e7c61ca4145b25b6a56b55e61c5b6b
-
SSDEEP
24576:7y3SQsYeZS8qqKjzMNXxZfqHV94iqzuD9cuWKVW:u3neZS8qqKjzsXxxwhkuf
Static task
static1
Behavioral task
behavioral1
Sample
d0b0138d226e783b7f7ac4ad6fc0f7f5184bde835e922542952d1ab4ef3622f1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
d0b0138d226e783b7f7ac4ad6fc0f7f5184bde835e922542952d1ab4ef3622f1
-
Size
1.0MB
-
MD5
bebd5a64aa7e26fc33807fe5825ae036
-
SHA1
16f346093f4b8855a89c2dc28d2322a65c3db6e4
-
SHA256
d0b0138d226e783b7f7ac4ad6fc0f7f5184bde835e922542952d1ab4ef3622f1
-
SHA512
922e36f874fa44e86ff32d53f451d5ebefcde5c193c282acc726d3e6988ae17baa4d6a7947fda39d2cf524b8eddbd5fa30e7c61ca4145b25b6a56b55e61c5b6b
-
SSDEEP
24576:7y3SQsYeZS8qqKjzMNXxZfqHV94iqzuD9cuWKVW:u3neZS8qqKjzsXxxwhkuf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-