General
-
Target
ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9
-
Size
1.0MB
-
Sample
230521-grn84aba9y
-
MD5
9ac3ca591755f06f0071dd5b6fa6eb99
-
SHA1
7bd1514589a16a8f6bef176babacc677d9cd33b5
-
SHA256
ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9
-
SHA512
2d64d9dca7481e15ba78642618ae721551e4cb81a650cccb147242cdf7c78e253e32c95c995f0f7a7a485b2b534ac80f3b887d3bf0da911867b34e63740b7664
-
SSDEEP
24576:AyH9QkcayJ6pTYUzUc/6re2mrFS6RHEE6BH10:HSAyQuLeRSibAV
Static task
static1
Behavioral task
behavioral1
Sample
ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9
-
Size
1.0MB
-
MD5
9ac3ca591755f06f0071dd5b6fa6eb99
-
SHA1
7bd1514589a16a8f6bef176babacc677d9cd33b5
-
SHA256
ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9
-
SHA512
2d64d9dca7481e15ba78642618ae721551e4cb81a650cccb147242cdf7c78e253e32c95c995f0f7a7a485b2b534ac80f3b887d3bf0da911867b34e63740b7664
-
SSDEEP
24576:AyH9QkcayJ6pTYUzUc/6re2mrFS6RHEE6BH10:HSAyQuLeRSibAV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-