General
-
Target
97ca7ddf7d3a572bb0e7ca021d973c96fa7c8849b29fabb25c4bce0e828b16f9
-
Size
1.0MB
-
Sample
230521-bkgmsaab7y
-
MD5
427658f2a8fd0b9a3c148b38f814ad33
-
SHA1
40ab8d8f91b2aec20ad913cbcd55c2d6a798d8e8
-
SHA256
97ca7ddf7d3a572bb0e7ca021d973c96fa7c8849b29fabb25c4bce0e828b16f9
-
SHA512
b26df7fcbdc27cf902a9bcf603edba019a4e81ea71ca9199f5cf30f9385bde5f45bf97903ff72859d7be1213908c1d92b53ec296f9c94d59d1f8dadb3fcbed2f
-
SSDEEP
24576:FyYd+NFQyupvqRrEKwayQT68PNcM0j9pbiYEpU5/3EGHiVwA:gYd+LXupvqRblnaM0ZSW/hHiG
Static task
static1
Behavioral task
behavioral1
Sample
97ca7ddf7d3a572bb0e7ca021d973c96fa7c8849b29fabb25c4bce0e828b16f9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
97ca7ddf7d3a572bb0e7ca021d973c96fa7c8849b29fabb25c4bce0e828b16f9
-
Size
1.0MB
-
MD5
427658f2a8fd0b9a3c148b38f814ad33
-
SHA1
40ab8d8f91b2aec20ad913cbcd55c2d6a798d8e8
-
SHA256
97ca7ddf7d3a572bb0e7ca021d973c96fa7c8849b29fabb25c4bce0e828b16f9
-
SHA512
b26df7fcbdc27cf902a9bcf603edba019a4e81ea71ca9199f5cf30f9385bde5f45bf97903ff72859d7be1213908c1d92b53ec296f9c94d59d1f8dadb3fcbed2f
-
SSDEEP
24576:FyYd+NFQyupvqRrEKwayQT68PNcM0j9pbiYEpU5/3EGHiVwA:gYd+LXupvqRblnaM0ZSW/hHiG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-