General
-
Target
launcher.exe
-
Size
1.0MB
-
Sample
230520-z7mz3seg48
-
MD5
9bd14f82c401fc2609e4a8dee3529e6d
-
SHA1
d7049289ab22cf0a5cd237d1956a14ba414fb42e
-
SHA256
ab8b4f42528db2341e4dfc452d8f3b806eeb7c2ed8c2057c79b370ae7a0d4f5e
-
SHA512
730f75dca66e405570b14e54f3b22ba6a564e22c6c7d698a053fa67bfa7b6c7bacccc763f975b243c6fee1439f783e2a6514195759bc98137877ea40a34df83e
-
SSDEEP
24576:iyopzp/gWPoDErZKft8kIta6mfmgAw+JzV0nBlXZ0NsW8:JopzSaoDP+kItJg8aBlpYsW
Static task
static1
Behavioral task
behavioral1
Sample
launcher.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
launcher.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daza
77.91.124.251:19065
-
auth_value
0bd5963efefdd6409185423d5ca3439c
Targets
-
-
Target
launcher.exe
-
Size
1.0MB
-
MD5
9bd14f82c401fc2609e4a8dee3529e6d
-
SHA1
d7049289ab22cf0a5cd237d1956a14ba414fb42e
-
SHA256
ab8b4f42528db2341e4dfc452d8f3b806eeb7c2ed8c2057c79b370ae7a0d4f5e
-
SHA512
730f75dca66e405570b14e54f3b22ba6a564e22c6c7d698a053fa67bfa7b6c7bacccc763f975b243c6fee1439f783e2a6514195759bc98137877ea40a34df83e
-
SSDEEP
24576:iyopzp/gWPoDErZKft8kIta6mfmgAw+JzV0nBlXZ0NsW8:JopzSaoDP+kItJg8aBlpYsW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-