General
-
Target
d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0
-
Size
1.0MB
-
Sample
230523-xhe7tsgg27
-
MD5
d1a9376ee30e36bcaf265e013a6825e6
-
SHA1
1f64482685594803ed624a433ddae88d0aac2c76
-
SHA256
d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0
-
SHA512
dc2b14f775c650bd6a3faff5d0633ec432a4e0db1c1bee1499e4ca983489e09dfba42c7078421a327ceac2947097e3cb8ecedd2bc312b0444efba0d0aaae1e7f
-
SSDEEP
24576:YyTZ9r21LO+fvvnR0RezSzOSrH83QGijYanjk3:fl9m6czSqyccfn
Static task
static1
Behavioral task
behavioral1
Sample
d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Targets
-
-
Target
d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0
-
Size
1.0MB
-
MD5
d1a9376ee30e36bcaf265e013a6825e6
-
SHA1
1f64482685594803ed624a433ddae88d0aac2c76
-
SHA256
d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0
-
SHA512
dc2b14f775c650bd6a3faff5d0633ec432a4e0db1c1bee1499e4ca983489e09dfba42c7078421a327ceac2947097e3cb8ecedd2bc312b0444efba0d0aaae1e7f
-
SSDEEP
24576:YyTZ9r21LO+fvvnR0RezSzOSrH83QGijYanjk3:fl9m6czSqyccfn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-