General
-
Target
3958beec01a767443475a26a3b7b75979517b141e3047b6f375240ba75cc2659
-
Size
1.0MB
-
Sample
230522-jwnt8seh82
-
MD5
cdcf7442b46b1954df94160b384ec9ab
-
SHA1
30d8e34f42f90c2fdec56e702ddf9b6bb734e9a0
-
SHA256
3958beec01a767443475a26a3b7b75979517b141e3047b6f375240ba75cc2659
-
SHA512
aa6c11dc3a70a78adcc8f12168f97361c13246c8d94d45936c1f74387583a464c73f83b4fa14cc804efc579dd856b7b22c49808976b156f901ead8e5671bc9c9
-
SSDEEP
24576:ky4sp5ZPBjfm4YEqesSUkTnlDz2zjwvsGrqYxf3r5OeUnvC:z40TBbmSqesSUylbsGnt5Op
Static task
static1
Behavioral task
behavioral1
Sample
3958beec01a767443475a26a3b7b75979517b141e3047b6f375240ba75cc2659.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dix
77.91.124.251:19065
-
auth_value
9b544b3d9c88af32e2f5bf8705f9a2fb
Targets
-
-
Target
3958beec01a767443475a26a3b7b75979517b141e3047b6f375240ba75cc2659
-
Size
1.0MB
-
MD5
cdcf7442b46b1954df94160b384ec9ab
-
SHA1
30d8e34f42f90c2fdec56e702ddf9b6bb734e9a0
-
SHA256
3958beec01a767443475a26a3b7b75979517b141e3047b6f375240ba75cc2659
-
SHA512
aa6c11dc3a70a78adcc8f12168f97361c13246c8d94d45936c1f74387583a464c73f83b4fa14cc804efc579dd856b7b22c49808976b156f901ead8e5671bc9c9
-
SSDEEP
24576:ky4sp5ZPBjfm4YEqesSUkTnlDz2zjwvsGrqYxf3r5OeUnvC:z40TBbmSqesSUylbsGnt5Op
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-