General
-
Target
d6798c7b56585e452a3a4c3f28415946286c3ab0c39c359523fd11b61df45272
-
Size
1021KB
-
Sample
230520-wp177sea37
-
MD5
e5491a663c46a0d4524644af1bdcf7b5
-
SHA1
74b8475db713091395d6a7647b5acdeed7632dc7
-
SHA256
d6798c7b56585e452a3a4c3f28415946286c3ab0c39c359523fd11b61df45272
-
SHA512
ae8305db6e0bc33dd068e826157db5cd1fe916f93c24c80174ced6799ae31211e823208383178f3d57f28e76d995420b28213f46d01082a40f31bb64307da4fb
-
SSDEEP
24576:MyKXjLaPPH9NYqN8NPs5kkUk3cCrN23gQMZ9Q2:7KXj+3H9NYqN8ycCrN
Static task
static1
Behavioral task
behavioral1
Sample
d6798c7b56585e452a3a4c3f28415946286c3ab0c39c359523fd11b61df45272.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daza
77.91.124.251:19065
-
auth_value
0bd5963efefdd6409185423d5ca3439c
Targets
-
-
Target
d6798c7b56585e452a3a4c3f28415946286c3ab0c39c359523fd11b61df45272
-
Size
1021KB
-
MD5
e5491a663c46a0d4524644af1bdcf7b5
-
SHA1
74b8475db713091395d6a7647b5acdeed7632dc7
-
SHA256
d6798c7b56585e452a3a4c3f28415946286c3ab0c39c359523fd11b61df45272
-
SHA512
ae8305db6e0bc33dd068e826157db5cd1fe916f93c24c80174ced6799ae31211e823208383178f3d57f28e76d995420b28213f46d01082a40f31bb64307da4fb
-
SSDEEP
24576:MyKXjLaPPH9NYqN8NPs5kkUk3cCrN23gQMZ9Q2:7KXj+3H9NYqN8ycCrN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-