General
-
Target
0abeebbe8f90e11dd36cb88af21efee92604f877fdfff0e02f69e07aee4a510e
-
Size
1020KB
-
Sample
230523-y3jw7aaa9v
-
MD5
98049dbb353b3d72bc1c23ee3ba89aca
-
SHA1
0b5f4769bacb76a8427a880fd161c4abe91bb3bf
-
SHA256
0abeebbe8f90e11dd36cb88af21efee92604f877fdfff0e02f69e07aee4a510e
-
SHA512
c594670564c9b68e2270564a2a3edb6441a5608c2936f466f93159cd313bf8d2fc04ad6578a7ac1185def9661f3e78c8d7f01294652674c7534f47836fb20dd5
-
SSDEEP
24576:Oymf4D3sdfvP+6/K9znnwi9UlET6PZcVz+:du4wjonb9UCTEcVz
Static task
static1
Behavioral task
behavioral1
Sample
0abeebbe8f90e11dd36cb88af21efee92604f877fdfff0e02f69e07aee4a510e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
0abeebbe8f90e11dd36cb88af21efee92604f877fdfff0e02f69e07aee4a510e
-
Size
1020KB
-
MD5
98049dbb353b3d72bc1c23ee3ba89aca
-
SHA1
0b5f4769bacb76a8427a880fd161c4abe91bb3bf
-
SHA256
0abeebbe8f90e11dd36cb88af21efee92604f877fdfff0e02f69e07aee4a510e
-
SHA512
c594670564c9b68e2270564a2a3edb6441a5608c2936f466f93159cd313bf8d2fc04ad6578a7ac1185def9661f3e78c8d7f01294652674c7534f47836fb20dd5
-
SSDEEP
24576:Oymf4D3sdfvP+6/K9znnwi9UlET6PZcVz+:du4wjonb9UCTEcVz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-