General
-
Target
f855c47593379e653639a7658793975f44aad5e444207b710d9a89860698ba8f
-
Size
1.0MB
-
Sample
230522-hf5x5shd5z
-
MD5
64a19624a7558bac537a2a840b53f850
-
SHA1
8da2c13e62d64db8c4ec09cf2bb4a5a3d2eaa571
-
SHA256
f855c47593379e653639a7658793975f44aad5e444207b710d9a89860698ba8f
-
SHA512
91854d4834068932e301628acd51793aab2583e727d32b8b392eaff045e6f15f8201996f34d5387e140556397432fc57642428074c88a24a264c7935f2be6987
-
SSDEEP
24576:syrbJDvARLzdI2dd91Zq5uhLWUoV8TrahCrH7vQYYE5pznUo48F:brWLzdbdZZq5QLWUS8qmyopAo48
Static task
static1
Behavioral task
behavioral1
Sample
f855c47593379e653639a7658793975f44aad5e444207b710d9a89860698ba8f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
f855c47593379e653639a7658793975f44aad5e444207b710d9a89860698ba8f
-
Size
1.0MB
-
MD5
64a19624a7558bac537a2a840b53f850
-
SHA1
8da2c13e62d64db8c4ec09cf2bb4a5a3d2eaa571
-
SHA256
f855c47593379e653639a7658793975f44aad5e444207b710d9a89860698ba8f
-
SHA512
91854d4834068932e301628acd51793aab2583e727d32b8b392eaff045e6f15f8201996f34d5387e140556397432fc57642428074c88a24a264c7935f2be6987
-
SSDEEP
24576:syrbJDvARLzdI2dd91Zq5uhLWUoV8TrahCrH7vQYYE5pznUo48F:brWLzdbdZZq5QLWUS8qmyopAo48
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-