General
-
Target
998c352179ec4b15a7eec17acef443e971239d839a1c71979f5ebdaf52cc3c2b
-
Size
1.0MB
-
Sample
230521-p4lyhach7y
-
MD5
9d006a0fe9081b4d1d4e30bf656c1f42
-
SHA1
dacdb72b9eeca14242dccf5a413cb5de69bd8244
-
SHA256
998c352179ec4b15a7eec17acef443e971239d839a1c71979f5ebdaf52cc3c2b
-
SHA512
56c2fc411a587a4767f31791cec6abc6aa3af2fa09cf8cb4778a03538be293d40731ae21efa226105c26e43445807a609d62d8cd78fcce51aba7e5b78b9dc782
-
SSDEEP
24576:LyHiKUdmJ6Pqp1iIlPoH6xqih7XzesfPS:+HiKUC6Pqp1HlPoaxlzesn
Static task
static1
Behavioral task
behavioral1
Sample
998c352179ec4b15a7eec17acef443e971239d839a1c71979f5ebdaf52cc3c2b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
998c352179ec4b15a7eec17acef443e971239d839a1c71979f5ebdaf52cc3c2b
-
Size
1.0MB
-
MD5
9d006a0fe9081b4d1d4e30bf656c1f42
-
SHA1
dacdb72b9eeca14242dccf5a413cb5de69bd8244
-
SHA256
998c352179ec4b15a7eec17acef443e971239d839a1c71979f5ebdaf52cc3c2b
-
SHA512
56c2fc411a587a4767f31791cec6abc6aa3af2fa09cf8cb4778a03538be293d40731ae21efa226105c26e43445807a609d62d8cd78fcce51aba7e5b78b9dc782
-
SSDEEP
24576:LyHiKUdmJ6Pqp1iIlPoH6xqih7XzesfPS:+HiKUC6Pqp1HlPoaxlzesn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-