General
-
Target
112a3b38ab92ba9ccc44bd7215974ab4efa7aaf8432dd2416fd36f8c5bf56a05
-
Size
1.0MB
-
Sample
230522-w9zvwacg6t
-
MD5
14c364fb7c1a58f417dcaab6fce2455b
-
SHA1
a99e28c6bf3584ee34d28d0950f6f308796b076d
-
SHA256
112a3b38ab92ba9ccc44bd7215974ab4efa7aaf8432dd2416fd36f8c5bf56a05
-
SHA512
d5747cbc0e6759d10dbecef57c6d43f923b46c3b0df71b09200129dcf979f13105ac1d05bec119184689ac55ae7a88d0e97d3c773537d06f6e39140fac835f8f
-
SSDEEP
24576:JyPZxe0JLfD+qvg+axtrpUD+ELoHSLisGD518FEXJEI:8PZE0h7w+abC6EPisGt18FgG
Static task
static1
Behavioral task
behavioral1
Sample
112a3b38ab92ba9ccc44bd7215974ab4efa7aaf8432dd2416fd36f8c5bf56a05.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dix
77.91.124.251:19065
-
auth_value
9b544b3d9c88af32e2f5bf8705f9a2fb
Targets
-
-
Target
112a3b38ab92ba9ccc44bd7215974ab4efa7aaf8432dd2416fd36f8c5bf56a05
-
Size
1.0MB
-
MD5
14c364fb7c1a58f417dcaab6fce2455b
-
SHA1
a99e28c6bf3584ee34d28d0950f6f308796b076d
-
SHA256
112a3b38ab92ba9ccc44bd7215974ab4efa7aaf8432dd2416fd36f8c5bf56a05
-
SHA512
d5747cbc0e6759d10dbecef57c6d43f923b46c3b0df71b09200129dcf979f13105ac1d05bec119184689ac55ae7a88d0e97d3c773537d06f6e39140fac835f8f
-
SSDEEP
24576:JyPZxe0JLfD+qvg+axtrpUD+ELoHSLisGD518FEXJEI:8PZE0h7w+abC6EPisGt18FgG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-