General
-
Target
15b0036f4875ca0d441796f32d8884f928fb4940a12ccbfb13ed54d776ecd6bc
-
Size
1.0MB
-
Sample
230521-l8f19sca91
-
MD5
a00d0f9a28143a80951e3640630634fa
-
SHA1
f8c9a1af04fa15c7525d68c989e83c3686605e49
-
SHA256
15b0036f4875ca0d441796f32d8884f928fb4940a12ccbfb13ed54d776ecd6bc
-
SHA512
0450e2ef7ffebc9d7e1949b4eddb32b848e3f0f52d222a1267f691ca3cefcdcfc7d50a518bf819d074f30e64e52a5a109548b1fd1922190fb29909314144b02d
-
SSDEEP
24576:9yz6oH+oWCMqBQHMGXKI9KdEwXeSrg+g/hRq:YGu+oiqC5XKSzwOSrFg/h
Static task
static1
Behavioral task
behavioral1
Sample
15b0036f4875ca0d441796f32d8884f928fb4940a12ccbfb13ed54d776ecd6bc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
15b0036f4875ca0d441796f32d8884f928fb4940a12ccbfb13ed54d776ecd6bc
-
Size
1.0MB
-
MD5
a00d0f9a28143a80951e3640630634fa
-
SHA1
f8c9a1af04fa15c7525d68c989e83c3686605e49
-
SHA256
15b0036f4875ca0d441796f32d8884f928fb4940a12ccbfb13ed54d776ecd6bc
-
SHA512
0450e2ef7ffebc9d7e1949b4eddb32b848e3f0f52d222a1267f691ca3cefcdcfc7d50a518bf819d074f30e64e52a5a109548b1fd1922190fb29909314144b02d
-
SSDEEP
24576:9yz6oH+oWCMqBQHMGXKI9KdEwXeSrg+g/hRq:YGu+oiqC5XKSzwOSrFg/h
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-