General
-
Target
9d1e16b3f81c387b8c8997ae08d519380b056de1236b5169aab7e33d548b73db
-
Size
1.0MB
-
Sample
230520-s8qc9sdb97
-
MD5
3275077564f8ec24105adba494e29a0d
-
SHA1
f6191121da3c290454946bd56db4d7ee22334e71
-
SHA256
9d1e16b3f81c387b8c8997ae08d519380b056de1236b5169aab7e33d548b73db
-
SHA512
12dcd1474222d5104322fcbb9d005cc5f8d26990b706e8931458419f0f8d59d83d4a1bd2a23a1c32d02769d630dfc74b25f3a2677b93ec4918df6071aca1fbb3
-
SSDEEP
24576:syYkENXsOk4zkxjmn5etcrREKSi+Xa5OF2gVrlfYoS0N:baNhBqq8CruKSi+rF1
Static task
static1
Behavioral task
behavioral1
Sample
9d1e16b3f81c387b8c8997ae08d519380b056de1236b5169aab7e33d548b73db.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
leren
77.91.68.253:19065
-
auth_value
4002956b5a03c59e4252363b86bc7713
Targets
-
-
Target
9d1e16b3f81c387b8c8997ae08d519380b056de1236b5169aab7e33d548b73db
-
Size
1.0MB
-
MD5
3275077564f8ec24105adba494e29a0d
-
SHA1
f6191121da3c290454946bd56db4d7ee22334e71
-
SHA256
9d1e16b3f81c387b8c8997ae08d519380b056de1236b5169aab7e33d548b73db
-
SHA512
12dcd1474222d5104322fcbb9d005cc5f8d26990b706e8931458419f0f8d59d83d4a1bd2a23a1c32d02769d630dfc74b25f3a2677b93ec4918df6071aca1fbb3
-
SSDEEP
24576:syYkENXsOk4zkxjmn5etcrREKSi+Xa5OF2gVrlfYoS0N:baNhBqq8CruKSi+rF1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-