General
-
Target
fc02f2526c3915d7fd9eca49d86ea8731d626e380e71142c2361639cff231ba0
-
Size
1.0MB
-
Sample
230521-nxt5vscf8v
-
MD5
db1195e2ecb7d375c62911c31901ff2a
-
SHA1
6e1459c101a76c895dc6155b3c3e8dafaba588a9
-
SHA256
fc02f2526c3915d7fd9eca49d86ea8731d626e380e71142c2361639cff231ba0
-
SHA512
7a5b645db4c08cc63044b2f447b3783bcbedb75e018b97b7f2479e32aac3d5f23dd1f985ab38875dd111d44220081c20eec12bf979bf101e65533b7c518fcc48
-
SSDEEP
24576:Ay+YzYC4ErptGy0BWUZqoVg/4DymVYbFehpwoFBpx:HFszyptp0JZqoVgIb+0hpwoFBp
Static task
static1
Behavioral task
behavioral1
Sample
fc02f2526c3915d7fd9eca49d86ea8731d626e380e71142c2361639cff231ba0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
fc02f2526c3915d7fd9eca49d86ea8731d626e380e71142c2361639cff231ba0
-
Size
1.0MB
-
MD5
db1195e2ecb7d375c62911c31901ff2a
-
SHA1
6e1459c101a76c895dc6155b3c3e8dafaba588a9
-
SHA256
fc02f2526c3915d7fd9eca49d86ea8731d626e380e71142c2361639cff231ba0
-
SHA512
7a5b645db4c08cc63044b2f447b3783bcbedb75e018b97b7f2479e32aac3d5f23dd1f985ab38875dd111d44220081c20eec12bf979bf101e65533b7c518fcc48
-
SSDEEP
24576:Ay+YzYC4ErptGy0BWUZqoVg/4DymVYbFehpwoFBpx:HFszyptp0JZqoVgIb+0hpwoFBp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-