General
-
Target
7d644e28beb82651cfbdb3ebf824b09940dc75f7ede3d47c06be135f60f80b00
-
Size
1.0MB
-
Sample
230521-zg78bscc95
-
MD5
a4bc61b3fd6be48857682bfdb39915c0
-
SHA1
eed74795a0de7ea440d7372d69cd3bfe0d7747a0
-
SHA256
7d644e28beb82651cfbdb3ebf824b09940dc75f7ede3d47c06be135f60f80b00
-
SHA512
fd174d196e6f4b3a852807da05c3eeddb336da2e5ebea38f2c6981847618d38405c5022b969e2177a9ac8058fe89adfed15baf5140335aeef77b4e7dc50bb018
-
SSDEEP
24576:Cyn6H+CZ2R5pRwBQ2cMrL2JTr1CTj43DHtWEjTm0e6udst:pQoDjSrL21SMTHtWOTmxq
Static task
static1
Behavioral task
behavioral1
Sample
7d644e28beb82651cfbdb3ebf824b09940dc75f7ede3d47c06be135f60f80b00.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
7d644e28beb82651cfbdb3ebf824b09940dc75f7ede3d47c06be135f60f80b00
-
Size
1.0MB
-
MD5
a4bc61b3fd6be48857682bfdb39915c0
-
SHA1
eed74795a0de7ea440d7372d69cd3bfe0d7747a0
-
SHA256
7d644e28beb82651cfbdb3ebf824b09940dc75f7ede3d47c06be135f60f80b00
-
SHA512
fd174d196e6f4b3a852807da05c3eeddb336da2e5ebea38f2c6981847618d38405c5022b969e2177a9ac8058fe89adfed15baf5140335aeef77b4e7dc50bb018
-
SSDEEP
24576:Cyn6H+CZ2R5pRwBQ2cMrL2JTr1CTj43DHtWEjTm0e6udst:pQoDjSrL21SMTHtWOTmxq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-