General
-
Target
e6b27ca1e9405ba051519d8dbf21e31e48be88fec93da4d9eb52cf4a9337d5e2
-
Size
1.0MB
-
Sample
230522-qjyx1agf23
-
MD5
18ae85095ed1cc09eeda3429fc6ec3d9
-
SHA1
82e95ba9b7c54f0e048cb4bd6328b4b06f6f8227
-
SHA256
e6b27ca1e9405ba051519d8dbf21e31e48be88fec93da4d9eb52cf4a9337d5e2
-
SHA512
da64b6e87babaa17f8e7d4e31ffd79083095bb62e7c8928f1791cddfc8342adb62b6733db0651e8a7006b8d624c88204adcdc96605437d3817e4864b38569a06
-
SSDEEP
24576:zyL9pJXRXYPRVBTITRaEHRgNausyQSSwZwerKhvSnHb:GLRXRyR+BKsbSRKtSn
Static task
static1
Behavioral task
behavioral1
Sample
e6b27ca1e9405ba051519d8dbf21e31e48be88fec93da4d9eb52cf4a9337d5e2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dix
77.91.124.251:19065
-
auth_value
9b544b3d9c88af32e2f5bf8705f9a2fb
Targets
-
-
Target
e6b27ca1e9405ba051519d8dbf21e31e48be88fec93da4d9eb52cf4a9337d5e2
-
Size
1.0MB
-
MD5
18ae85095ed1cc09eeda3429fc6ec3d9
-
SHA1
82e95ba9b7c54f0e048cb4bd6328b4b06f6f8227
-
SHA256
e6b27ca1e9405ba051519d8dbf21e31e48be88fec93da4d9eb52cf4a9337d5e2
-
SHA512
da64b6e87babaa17f8e7d4e31ffd79083095bb62e7c8928f1791cddfc8342adb62b6733db0651e8a7006b8d624c88204adcdc96605437d3817e4864b38569a06
-
SSDEEP
24576:zyL9pJXRXYPRVBTITRaEHRgNausyQSSwZwerKhvSnHb:GLRXRyR+BKsbSRKtSn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-