General
-
Target
f402416434a2ec6aff36921c323d104ffcdb15039e86f7737b18a5e3bbfff92a
-
Size
1.0MB
-
Sample
230521-vkx5babd22
-
MD5
9d53d6682d112a3570aac1dd1bceb3b4
-
SHA1
07db5434e574f8b020e203c975f8758c0368b8b9
-
SHA256
f402416434a2ec6aff36921c323d104ffcdb15039e86f7737b18a5e3bbfff92a
-
SHA512
02a8f31919b6bc54a3cc9aad91aa2af8c68dd7540d61771e3d59db1a32d0e854311163ab51617789611906a46056b593b57133aa8003c64766f6a629572a19e1
-
SSDEEP
24576:yyZyiNRhTLB06qRD7jEJFTUnjTs6BSaRTEpt+q+PMv:ZVRda6qxVjYWSaRIpt+q+
Static task
static1
Behavioral task
behavioral1
Sample
f402416434a2ec6aff36921c323d104ffcdb15039e86f7737b18a5e3bbfff92a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
f402416434a2ec6aff36921c323d104ffcdb15039e86f7737b18a5e3bbfff92a
-
Size
1.0MB
-
MD5
9d53d6682d112a3570aac1dd1bceb3b4
-
SHA1
07db5434e574f8b020e203c975f8758c0368b8b9
-
SHA256
f402416434a2ec6aff36921c323d104ffcdb15039e86f7737b18a5e3bbfff92a
-
SHA512
02a8f31919b6bc54a3cc9aad91aa2af8c68dd7540d61771e3d59db1a32d0e854311163ab51617789611906a46056b593b57133aa8003c64766f6a629572a19e1
-
SSDEEP
24576:yyZyiNRhTLB06qRD7jEJFTUnjTs6BSaRTEpt+q+PMv:ZVRda6qxVjYWSaRIpt+q+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-