General
-
Target
af08a124c35bdbb81adf8cc7a466d6bd2fa0b2ae29e140ee5dabd60a2198c5bb
-
Size
1.0MB
-
Sample
230523-tnzxmsga96
-
MD5
5551d0bc3d4bfcb08c3265ddc6164cc5
-
SHA1
931cfad6c1c40ee23bd0ea514f81f6f35b432e0e
-
SHA256
af08a124c35bdbb81adf8cc7a466d6bd2fa0b2ae29e140ee5dabd60a2198c5bb
-
SHA512
0e18303a4bc0e9dde1843133621fc646e1810364acee43540dbd33f05cb932fc966c6a1053fc6aafdfc2e2d939ecba0c546d48750d8e61cf5011592e47172bba
-
SSDEEP
24576:/yJ56KGMzyuy7ynQdOEVoVZgB9X2KAMUZDA/3sN8qX2bsK9:K76HMOXswwgB9X2KAMQD0zj
Static task
static1
Behavioral task
behavioral1
Sample
af08a124c35bdbb81adf8cc7a466d6bd2fa0b2ae29e140ee5dabd60a2198c5bb.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
af08a124c35bdbb81adf8cc7a466d6bd2fa0b2ae29e140ee5dabd60a2198c5bb
-
Size
1.0MB
-
MD5
5551d0bc3d4bfcb08c3265ddc6164cc5
-
SHA1
931cfad6c1c40ee23bd0ea514f81f6f35b432e0e
-
SHA256
af08a124c35bdbb81adf8cc7a466d6bd2fa0b2ae29e140ee5dabd60a2198c5bb
-
SHA512
0e18303a4bc0e9dde1843133621fc646e1810364acee43540dbd33f05cb932fc966c6a1053fc6aafdfc2e2d939ecba0c546d48750d8e61cf5011592e47172bba
-
SSDEEP
24576:/yJ56KGMzyuy7ynQdOEVoVZgB9X2KAMUZDA/3sN8qX2bsK9:K76HMOXswwgB9X2KAMQD0zj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-