General
-
Target
1f75d824c2ab9bc5064aeb30ae7e11d67a72e8aec107f436f50ae473a47d2e5e
-
Size
1.0MB
-
Sample
230520-fmqqpaae96
-
MD5
3288dc1eddde3389cb873f6dddd924a1
-
SHA1
dea875dbee3fd2d192e32275b9dcc1c6da9f867e
-
SHA256
1f75d824c2ab9bc5064aeb30ae7e11d67a72e8aec107f436f50ae473a47d2e5e
-
SHA512
345ba3ff7873098472c4e688e0a45ab74736f4d211b5d15a5bd1c136321701cf7c2ea36dfa532531ed42cce25ee68f5e65c5761c2c1cbd750a2734cea7c4a4b1
-
SSDEEP
24576:qywpm/+JAUeApIJ4d1dROCqK9ta4YShpcr:xwzJAUFpIJQ1vGqtx1n
Static task
static1
Behavioral task
behavioral1
Sample
1f75d824c2ab9bc5064aeb30ae7e11d67a72e8aec107f436f50ae473a47d2e5e.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Targets
-
-
Target
1f75d824c2ab9bc5064aeb30ae7e11d67a72e8aec107f436f50ae473a47d2e5e
-
Size
1.0MB
-
MD5
3288dc1eddde3389cb873f6dddd924a1
-
SHA1
dea875dbee3fd2d192e32275b9dcc1c6da9f867e
-
SHA256
1f75d824c2ab9bc5064aeb30ae7e11d67a72e8aec107f436f50ae473a47d2e5e
-
SHA512
345ba3ff7873098472c4e688e0a45ab74736f4d211b5d15a5bd1c136321701cf7c2ea36dfa532531ed42cce25ee68f5e65c5761c2c1cbd750a2734cea7c4a4b1
-
SSDEEP
24576:qywpm/+JAUeApIJ4d1dROCqK9ta4YShpcr:xwzJAUFpIJQ1vGqtx1n
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-