General
-
Target
7431753457c5413e88b199123c36d6e6f745da70ee62601ae7944e2a03a62560
-
Size
1.0MB
-
Sample
230521-zsys2acd59
-
MD5
e4d6cab7cdd37d9e806bf348d418b074
-
SHA1
336e5dbebfd877454af89a3ce2a308eaf19c49d1
-
SHA256
7431753457c5413e88b199123c36d6e6f745da70ee62601ae7944e2a03a62560
-
SHA512
b5a61e42fcdab330668350191de840aa8ce9ca0c66361c217218e9ba54feb26341629adb2daf0d07a74a33bd88eae41ea0584dfc4767eade1e8bd63b01af92bc
-
SSDEEP
24576:jyWg4HoZsMXPcqJEGSYmzrMFha80GHdRQbjUZO:2WLYssUqJ5SYmzrMj306wU
Static task
static1
Behavioral task
behavioral1
Sample
7431753457c5413e88b199123c36d6e6f745da70ee62601ae7944e2a03a62560.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
7431753457c5413e88b199123c36d6e6f745da70ee62601ae7944e2a03a62560
-
Size
1.0MB
-
MD5
e4d6cab7cdd37d9e806bf348d418b074
-
SHA1
336e5dbebfd877454af89a3ce2a308eaf19c49d1
-
SHA256
7431753457c5413e88b199123c36d6e6f745da70ee62601ae7944e2a03a62560
-
SHA512
b5a61e42fcdab330668350191de840aa8ce9ca0c66361c217218e9ba54feb26341629adb2daf0d07a74a33bd88eae41ea0584dfc4767eade1e8bd63b01af92bc
-
SSDEEP
24576:jyWg4HoZsMXPcqJEGSYmzrMFha80GHdRQbjUZO:2WLYssUqJ5SYmzrMj306wU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-