General
-
Target
f9bfddb4fbc18f4967628d53c6afc182e6d1d65c3e9ba5705f35adeddcf7b0cd
-
Size
1.0MB
-
Sample
230523-h1h9wafb2v
-
MD5
ce38ad216cbf88242de04f8ca44dfd24
-
SHA1
a753f6690be7f1d019f3784743363303c6a5b389
-
SHA256
f9bfddb4fbc18f4967628d53c6afc182e6d1d65c3e9ba5705f35adeddcf7b0cd
-
SHA512
2c816d5a3be60137c80469bfb0b4d1c14dc2a758d3b626ad5d73f64575cc63fc8cbdda52f07d64a8c22f5eaa43de08e02862b81f51c146408135029cc880b409
-
SSDEEP
24576:IygHUviuYE712swXHACCuR2QKY/eES6spTgo2r54:PGUquYE71lwGuEGeKwTQ
Static task
static1
Behavioral task
behavioral1
Sample
f9bfddb4fbc18f4967628d53c6afc182e6d1d65c3e9ba5705f35adeddcf7b0cd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
duxa
77.91.68.157:19065
-
auth_value
953a331341f07583fec00af44e01ec7d
Targets
-
-
Target
f9bfddb4fbc18f4967628d53c6afc182e6d1d65c3e9ba5705f35adeddcf7b0cd
-
Size
1.0MB
-
MD5
ce38ad216cbf88242de04f8ca44dfd24
-
SHA1
a753f6690be7f1d019f3784743363303c6a5b389
-
SHA256
f9bfddb4fbc18f4967628d53c6afc182e6d1d65c3e9ba5705f35adeddcf7b0cd
-
SHA512
2c816d5a3be60137c80469bfb0b4d1c14dc2a758d3b626ad5d73f64575cc63fc8cbdda52f07d64a8c22f5eaa43de08e02862b81f51c146408135029cc880b409
-
SSDEEP
24576:IygHUviuYE712swXHACCuR2QKY/eES6spTgo2r54:PGUquYE71lwGuEGeKwTQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-