General
-
Target
612351af0fb2669c3414b261d75d9022a904e07364a7bb2c21b91dabdced2f34
-
Size
1.0MB
-
Sample
230521-l7zf8ahd58
-
MD5
203aba96e9dd9ea94198e88660c068c8
-
SHA1
235b3eacd990311027b87e42a2c45e5fb1de1afe
-
SHA256
612351af0fb2669c3414b261d75d9022a904e07364a7bb2c21b91dabdced2f34
-
SHA512
f0a937228a70834d417dabe5b2b9745a64e4b24cad9d0675b975865679e3e5cd8c1dfbd061855a60a42720f50c5b337dfef7ee0546910d6484ed5e4a24ac16d0
-
SSDEEP
24576:Jy/s/R/lSLus0m7afe0QBDz0odPsocCEVF0/kaTbc:8/wSLu013PBbEVF0/kaT
Static task
static1
Behavioral task
behavioral1
Sample
612351af0fb2669c3414b261d75d9022a904e07364a7bb2c21b91dabdced2f34.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
612351af0fb2669c3414b261d75d9022a904e07364a7bb2c21b91dabdced2f34
-
Size
1.0MB
-
MD5
203aba96e9dd9ea94198e88660c068c8
-
SHA1
235b3eacd990311027b87e42a2c45e5fb1de1afe
-
SHA256
612351af0fb2669c3414b261d75d9022a904e07364a7bb2c21b91dabdced2f34
-
SHA512
f0a937228a70834d417dabe5b2b9745a64e4b24cad9d0675b975865679e3e5cd8c1dfbd061855a60a42720f50c5b337dfef7ee0546910d6484ed5e4a24ac16d0
-
SSDEEP
24576:Jy/s/R/lSLus0m7afe0QBDz0odPsocCEVF0/kaTbc:8/wSLu013PBbEVF0/kaT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-