General
-
Target
0e9985758e92dab644fa0d7b0dd5b965ef6236d5c3e11ea8b14b28c13c6b9c77
-
Size
1.0MB
-
Sample
230520-w7lkgagg2t
-
MD5
72cb2237bb27f16dea22a76151f38fed
-
SHA1
043ae3426e77238f811849b102186ac9f293f8db
-
SHA256
0e9985758e92dab644fa0d7b0dd5b965ef6236d5c3e11ea8b14b28c13c6b9c77
-
SHA512
6d3f6a911fe982e720e70f16b0fe1e65fe8514acb28efde77e473a02a188fda69611bb2984a8decfa5bc81d29f287419a8d597aa629536c624a4b8902ca92425
-
SSDEEP
24576:tymOMxhf9bh8lybabqW15akXYWP2H34UWC6VAky9sEf47J:Imdfh84abqDMA8ES
Static task
static1
Behavioral task
behavioral1
Sample
0e9985758e92dab644fa0d7b0dd5b965ef6236d5c3e11ea8b14b28c13c6b9c77.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daza
77.91.124.251:19065
-
auth_value
0bd5963efefdd6409185423d5ca3439c
Targets
-
-
Target
0e9985758e92dab644fa0d7b0dd5b965ef6236d5c3e11ea8b14b28c13c6b9c77
-
Size
1.0MB
-
MD5
72cb2237bb27f16dea22a76151f38fed
-
SHA1
043ae3426e77238f811849b102186ac9f293f8db
-
SHA256
0e9985758e92dab644fa0d7b0dd5b965ef6236d5c3e11ea8b14b28c13c6b9c77
-
SHA512
6d3f6a911fe982e720e70f16b0fe1e65fe8514acb28efde77e473a02a188fda69611bb2984a8decfa5bc81d29f287419a8d597aa629536c624a4b8902ca92425
-
SSDEEP
24576:tymOMxhf9bh8lybabqW15akXYWP2H34UWC6VAky9sEf47J:Imdfh84abqDMA8ES
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-