General
-
Target
22e6c33f075fd1dd97e874ad38273137030b6dcb8553dcaffed6bc3c30bd846a
-
Size
1.0MB
-
Sample
230522-h8wj6seg62
-
MD5
fae4fb2e8628342f3ba20955f1b46eb4
-
SHA1
30f2d8b399e4987b5a573eafb399fe9c8b48da2a
-
SHA256
22e6c33f075fd1dd97e874ad38273137030b6dcb8553dcaffed6bc3c30bd846a
-
SHA512
40fbfdcf65f4ee55a24067e8561a371e65425e530dc17c74771bb7dda73adf8bcd5c65966e16b1c52686ea0d7fd76d750979f58758514b0078a08894129d6e7c
-
SSDEEP
24576:Ny2oteaf5z2gw/nKFPokI97hJNV1kmiuMNAnnghDyH:oxgwz28Z5iJHyvZAEDy
Static task
static1
Behavioral task
behavioral1
Sample
22e6c33f075fd1dd97e874ad38273137030b6dcb8553dcaffed6bc3c30bd846a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
22e6c33f075fd1dd97e874ad38273137030b6dcb8553dcaffed6bc3c30bd846a
-
Size
1.0MB
-
MD5
fae4fb2e8628342f3ba20955f1b46eb4
-
SHA1
30f2d8b399e4987b5a573eafb399fe9c8b48da2a
-
SHA256
22e6c33f075fd1dd97e874ad38273137030b6dcb8553dcaffed6bc3c30bd846a
-
SHA512
40fbfdcf65f4ee55a24067e8561a371e65425e530dc17c74771bb7dda73adf8bcd5c65966e16b1c52686ea0d7fd76d750979f58758514b0078a08894129d6e7c
-
SSDEEP
24576:Ny2oteaf5z2gw/nKFPokI97hJNV1kmiuMNAnnghDyH:oxgwz28Z5iJHyvZAEDy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-