General
-
Target
f3df4602f7f7b9e498369c2a64984b9048db7621b81b700696b1bebd61712c9b
-
Size
1.0MB
-
Sample
230521-z6mmxsce29
-
MD5
2ff0c85babbe6527153ad656a76e3446
-
SHA1
9a518c246d4a9d58ed78b7a7168cb8e3a41131ee
-
SHA256
f3df4602f7f7b9e498369c2a64984b9048db7621b81b700696b1bebd61712c9b
-
SHA512
0c02aeb686abe880b82252a2ffb4539f343797e01415f31c4bbbe45d3385e7277dfe0d8c1490d461df922e1ef5967c02c27341967107fa6b919b4f0ae317e382
-
SSDEEP
24576:Hy8PaV5QdoWYlqTF1clUPtGW0nvaHR3XPGUua/T:STkSlqTF1ciRhHtPGUr
Static task
static1
Behavioral task
behavioral1
Sample
f3df4602f7f7b9e498369c2a64984b9048db7621b81b700696b1bebd61712c9b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
f3df4602f7f7b9e498369c2a64984b9048db7621b81b700696b1bebd61712c9b
-
Size
1.0MB
-
MD5
2ff0c85babbe6527153ad656a76e3446
-
SHA1
9a518c246d4a9d58ed78b7a7168cb8e3a41131ee
-
SHA256
f3df4602f7f7b9e498369c2a64984b9048db7621b81b700696b1bebd61712c9b
-
SHA512
0c02aeb686abe880b82252a2ffb4539f343797e01415f31c4bbbe45d3385e7277dfe0d8c1490d461df922e1ef5967c02c27341967107fa6b919b4f0ae317e382
-
SSDEEP
24576:Hy8PaV5QdoWYlqTF1clUPtGW0nvaHR3XPGUua/T:STkSlqTF1ciRhHtPGUr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-