General
-
Target
eb75a0b6dcedca927195b507970f3bc289f0afec42b6c1f1779f538159e4aa80
-
Size
1.0MB
-
Sample
230520-g11y9ade81
-
MD5
b147ea5273354dfe145510830eba7781
-
SHA1
0e87b97ee2d1da3a3b72238428bc990665a07df7
-
SHA256
eb75a0b6dcedca927195b507970f3bc289f0afec42b6c1f1779f538159e4aa80
-
SHA512
b7090a08f054ed2d12b7742a071214ad5e952d3dd62e4a3a6d1855d2f57d54df22121a4719624f49149319a3a401c3fbcaf972402bf21bb232e62ce06e4f5e80
-
SSDEEP
24576:UyJTwjxtNKhEKYm/Z06CIORLZF51it26BBE5Kx3:jtGNKn/nCImzAt2Z5a
Static task
static1
Behavioral task
behavioral1
Sample
eb75a0b6dcedca927195b507970f3bc289f0afec42b6c1f1779f538159e4aa80.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Targets
-
-
Target
eb75a0b6dcedca927195b507970f3bc289f0afec42b6c1f1779f538159e4aa80
-
Size
1.0MB
-
MD5
b147ea5273354dfe145510830eba7781
-
SHA1
0e87b97ee2d1da3a3b72238428bc990665a07df7
-
SHA256
eb75a0b6dcedca927195b507970f3bc289f0afec42b6c1f1779f538159e4aa80
-
SHA512
b7090a08f054ed2d12b7742a071214ad5e952d3dd62e4a3a6d1855d2f57d54df22121a4719624f49149319a3a401c3fbcaf972402bf21bb232e62ce06e4f5e80
-
SSDEEP
24576:UyJTwjxtNKhEKYm/Z06CIORLZF51it26BBE5Kx3:jtGNKn/nCImzAt2Z5a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-