General
-
Target
2e227aa4adc1f1786e57b7b5e45c136961449bb97c1dad4a0c12a2ea8160598b
-
Size
1022KB
-
Sample
230521-ryr9faae75
-
MD5
4b3e44b602ae08df703d909c19e02877
-
SHA1
191245908345c3c3d9544f3048bd188b6e318f42
-
SHA256
2e227aa4adc1f1786e57b7b5e45c136961449bb97c1dad4a0c12a2ea8160598b
-
SHA512
7080bddd7d03ab516bb9a0de7e49a32fb25c1a2b03e67cbf2a8aa9c7c523a1f77802c090310b7a6e8a7e05e825a1cc33c5ef04c600eb91e866d03c3810cc8bca
-
SSDEEP
24576:lyZAEn0txPHIUnqYE5R3lI0rwtQ5nUvZ5u26wmATBJdq:AZhiPHIUnqYEHV1+d5u26G
Static task
static1
Behavioral task
behavioral1
Sample
2e227aa4adc1f1786e57b7b5e45c136961449bb97c1dad4a0c12a2ea8160598b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
2e227aa4adc1f1786e57b7b5e45c136961449bb97c1dad4a0c12a2ea8160598b
-
Size
1022KB
-
MD5
4b3e44b602ae08df703d909c19e02877
-
SHA1
191245908345c3c3d9544f3048bd188b6e318f42
-
SHA256
2e227aa4adc1f1786e57b7b5e45c136961449bb97c1dad4a0c12a2ea8160598b
-
SHA512
7080bddd7d03ab516bb9a0de7e49a32fb25c1a2b03e67cbf2a8aa9c7c523a1f77802c090310b7a6e8a7e05e825a1cc33c5ef04c600eb91e866d03c3810cc8bca
-
SSDEEP
24576:lyZAEn0txPHIUnqYE5R3lI0rwtQ5nUvZ5u26wmATBJdq:AZhiPHIUnqYEHV1+d5u26G
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-