General
-
Target
5659b5b2c5c3493a1982d2207c69a7417be7a7badefba2e43c103311f1ac5bfb
-
Size
1.0MB
-
Sample
230521-hgm4qagf32
-
MD5
2493d325976142bc32dcbe5a1dc21a58
-
SHA1
2d23d605a9a92ee758625275cd40ab6e43c5f573
-
SHA256
5659b5b2c5c3493a1982d2207c69a7417be7a7badefba2e43c103311f1ac5bfb
-
SHA512
a77d2e94660bb78cb883761023b95300114ed83d4e78491631608716efac21fbb2b764c2a1d921dc09f87b14064417fb55fcd45ce11ffcb18dbc3cc4cf1e4217
-
SSDEEP
24576:SyilZo+w//XovNZYqqPswvDkl5AlEs8zej+OO:5iYh/XovNuqqkw4rkuqa
Static task
static1
Behavioral task
behavioral1
Sample
5659b5b2c5c3493a1982d2207c69a7417be7a7badefba2e43c103311f1ac5bfb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
5659b5b2c5c3493a1982d2207c69a7417be7a7badefba2e43c103311f1ac5bfb
-
Size
1.0MB
-
MD5
2493d325976142bc32dcbe5a1dc21a58
-
SHA1
2d23d605a9a92ee758625275cd40ab6e43c5f573
-
SHA256
5659b5b2c5c3493a1982d2207c69a7417be7a7badefba2e43c103311f1ac5bfb
-
SHA512
a77d2e94660bb78cb883761023b95300114ed83d4e78491631608716efac21fbb2b764c2a1d921dc09f87b14064417fb55fcd45ce11ffcb18dbc3cc4cf1e4217
-
SSDEEP
24576:SyilZo+w//XovNZYqqPswvDkl5AlEs8zej+OO:5iYh/XovNuqqkw4rkuqa
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-