General
-
Target
99054132d8a19f4fcd4169f7a2dff965a22f020155f92e23703b139676c27621
-
Size
1021KB
-
Sample
230521-vpj39aeb3s
-
MD5
846eda5f9e2d9bdcec473cc0d1a00531
-
SHA1
c75cd4da21e887f8271c67253337485e06954814
-
SHA256
99054132d8a19f4fcd4169f7a2dff965a22f020155f92e23703b139676c27621
-
SHA512
1ea3245b53314c779d807209bc495bc950601547f542031debd9c37f9e95cfea25e30700e2bbc318ce9fcae41c9cbd65ec7b480cfad7ba49e943b4627e474bb9
-
SSDEEP
24576:/ypIgfZ9EvlUt1BOqMBrldaw1o1ieZGbZdpi7l6tslW1A0ddf/Qs:KlrEvEXOqxw1ZZu7x50zf/Q
Static task
static1
Behavioral task
behavioral1
Sample
99054132d8a19f4fcd4169f7a2dff965a22f020155f92e23703b139676c27621.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
luza
185.161.248.37:4138
-
auth_value
1261701914d508e02e8b4f25d38bc7f9
Targets
-
-
Target
99054132d8a19f4fcd4169f7a2dff965a22f020155f92e23703b139676c27621
-
Size
1021KB
-
MD5
846eda5f9e2d9bdcec473cc0d1a00531
-
SHA1
c75cd4da21e887f8271c67253337485e06954814
-
SHA256
99054132d8a19f4fcd4169f7a2dff965a22f020155f92e23703b139676c27621
-
SHA512
1ea3245b53314c779d807209bc495bc950601547f542031debd9c37f9e95cfea25e30700e2bbc318ce9fcae41c9cbd65ec7b480cfad7ba49e943b4627e474bb9
-
SSDEEP
24576:/ypIgfZ9EvlUt1BOqMBrldaw1o1ieZGbZdpi7l6tslW1A0ddf/Qs:KlrEvEXOqxw1ZZu7x50zf/Q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-