General
-
Target
bf952edb98d988bf38e440661af1bf403f830aace344fb46ca80923f18fd7d45
-
Size
1.0MB
-
Sample
230520-rwb5facg43
-
MD5
bc7285f58a9290f7f156ac7670724611
-
SHA1
9738315821f220f88526d7d637d5bca7ca2104c7
-
SHA256
bf952edb98d988bf38e440661af1bf403f830aace344fb46ca80923f18fd7d45
-
SHA512
83700e67b91e2c71495d9cb436585c1a7ffa8ace425db16772008bd84d772fa4f2ab4e639ca0e91c092c18c0c4133eecf5080d922c0d2eee5c76b1410560bfc4
-
SSDEEP
24576:Dy+Cr7/pd2JG3ngQmSQUQLpvRMFQhnIelzXsTKZoDpP5G:WznpY4wJzUQVJMFMnv7sTKcP5
Static task
static1
Behavioral task
behavioral1
Sample
bf952edb98d988bf38e440661af1bf403f830aace344fb46ca80923f18fd7d45.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Targets
-
-
Target
bf952edb98d988bf38e440661af1bf403f830aace344fb46ca80923f18fd7d45
-
Size
1.0MB
-
MD5
bc7285f58a9290f7f156ac7670724611
-
SHA1
9738315821f220f88526d7d637d5bca7ca2104c7
-
SHA256
bf952edb98d988bf38e440661af1bf403f830aace344fb46ca80923f18fd7d45
-
SHA512
83700e67b91e2c71495d9cb436585c1a7ffa8ace425db16772008bd84d772fa4f2ab4e639ca0e91c092c18c0c4133eecf5080d922c0d2eee5c76b1410560bfc4
-
SSDEEP
24576:Dy+Cr7/pd2JG3ngQmSQUQLpvRMFQhnIelzXsTKZoDpP5G:WznpY4wJzUQVJMFMnv7sTKcP5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-