General
-
Target
c604b9aa3249a443371bd4d1b0bdf552.bin
-
Size
985KB
-
Sample
230522-b2a7bsgc2t
-
MD5
f490479012f8df56ddbc83a8ea680304
-
SHA1
26ec5eecc4cfa80c26cbc101cfe69bc209ee06b0
-
SHA256
817da3f65539e095ea7bed5980eb576994e446dc4bfd529714f6c2a107c05721
-
SHA512
2c14a3676cc6b55200df65f40ca9c2fcf2eb838852758b8ede18de053e9ac4c9bb4cdf5085bed2d91bae397cf7b5124bfbe4c7fb42b4f9913a8ff953811944c2
-
SSDEEP
24576:P5toti4bdUQWYwyz0OQg7CozHxEX2Od/uyHLxirYw4NDLu:BytrJUTY90OQg7CoV62hyHcADa
Static task
static1
Behavioral task
behavioral1
Sample
5a34bfde198e8455a3c4c47cdc7592ec250ab45b44c45cef00152bc6e05f78e0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5a34bfde198e8455a3c4c47cdc7592ec250ab45b44c45cef00152bc6e05f78e0.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
daza
77.91.124.251:19065
-
auth_value
0bd5963efefdd6409185423d5ca3439c
Targets
-
-
Target
5a34bfde198e8455a3c4c47cdc7592ec250ab45b44c45cef00152bc6e05f78e0.exe
-
Size
1.0MB
-
MD5
c604b9aa3249a443371bd4d1b0bdf552
-
SHA1
9a444165f8d8c737261a20fcac6196703126ceac
-
SHA256
5a34bfde198e8455a3c4c47cdc7592ec250ab45b44c45cef00152bc6e05f78e0
-
SHA512
47265d891c9a3d0603a6abb5bfaeb3f42ab1d8ebd360eb455e223b0a9a5779f57a60989301856c8806f7c549aae62fd710a6fb4423a0849961ab46f3a110f7bf
-
SSDEEP
24576:Ey184IHXcyZkNVEzEBrgpv3pIEECofcBH5u5Ii:T64I3cvRrIBIEHgccI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-