General
-
Target
5b5fee64edbf23f3c15af5bb442b154301b97fa2524c54d9a26e69c189cd556e
-
Size
1021KB
-
Sample
230521-y72b2afb4w
-
MD5
33b69d47db36c48ad4b9d43c6317614b
-
SHA1
4b55d87a1ac713b4207eb94bb4037c2574baf519
-
SHA256
5b5fee64edbf23f3c15af5bb442b154301b97fa2524c54d9a26e69c189cd556e
-
SHA512
2e80135da7dfea585828eb9b1b84ed6580f69734545f0bbdd981748c29aaeff993348639bbe3f94de3ee8ed9ad67dd1319c787253448e9fb709fecb08276e842
-
SSDEEP
24576:iyThwc/TyvpqvQbnNO11PF0hyCZkSUTS81lq7lFQGhrxF+vbRG8urH:JT0vpqvOOXF0I+kSES81ojQGMkr
Static task
static1
Behavioral task
behavioral1
Sample
5b5fee64edbf23f3c15af5bb442b154301b97fa2524c54d9a26e69c189cd556e.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
luza
185.161.248.37:4138
-
auth_value
1261701914d508e02e8b4f25d38bc7f9
Targets
-
-
Target
5b5fee64edbf23f3c15af5bb442b154301b97fa2524c54d9a26e69c189cd556e
-
Size
1021KB
-
MD5
33b69d47db36c48ad4b9d43c6317614b
-
SHA1
4b55d87a1ac713b4207eb94bb4037c2574baf519
-
SHA256
5b5fee64edbf23f3c15af5bb442b154301b97fa2524c54d9a26e69c189cd556e
-
SHA512
2e80135da7dfea585828eb9b1b84ed6580f69734545f0bbdd981748c29aaeff993348639bbe3f94de3ee8ed9ad67dd1319c787253448e9fb709fecb08276e842
-
SSDEEP
24576:iyThwc/TyvpqvQbnNO11PF0hyCZkSUTS81lq7lFQGhrxF+vbRG8urH:JT0vpqvOOXF0I+kSES81ojQGMkr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-