General
-
Target
225789bb9600ef2379a6ae1b6c78a1dbf1726e6b25fc7f2362f3d56201f925bf
-
Size
1.0MB
-
Sample
230520-e273vadb61
-
MD5
1255447407e93ad992208e196db6c620
-
SHA1
8faee91b99b1d0579d8a8be8722dc264c77c02ea
-
SHA256
225789bb9600ef2379a6ae1b6c78a1dbf1726e6b25fc7f2362f3d56201f925bf
-
SHA512
171d6f2e31b581db94e38c58c9e82439e5f6616dbf281303ae810540df810118c2c0c75b89a08a185aab342787c3fc6df5202e5c16676056bba739bafdb2fb4d
-
SSDEEP
24576:ry6YEbVgJ1omVE0a3yvjcdjOrzDeBglYTLdhl:e6nbmJVVE0a3yoQUglYTLd
Static task
static1
Behavioral task
behavioral1
Sample
225789bb9600ef2379a6ae1b6c78a1dbf1726e6b25fc7f2362f3d56201f925bf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
meren
77.91.68.253:19065
-
auth_value
a26557b435e44b55fdd4708fbba97d21
Targets
-
-
Target
225789bb9600ef2379a6ae1b6c78a1dbf1726e6b25fc7f2362f3d56201f925bf
-
Size
1.0MB
-
MD5
1255447407e93ad992208e196db6c620
-
SHA1
8faee91b99b1d0579d8a8be8722dc264c77c02ea
-
SHA256
225789bb9600ef2379a6ae1b6c78a1dbf1726e6b25fc7f2362f3d56201f925bf
-
SHA512
171d6f2e31b581db94e38c58c9e82439e5f6616dbf281303ae810540df810118c2c0c75b89a08a185aab342787c3fc6df5202e5c16676056bba739bafdb2fb4d
-
SSDEEP
24576:ry6YEbVgJ1omVE0a3yvjcdjOrzDeBglYTLdhl:e6nbmJVVE0a3yoQUglYTLd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-