General
-
Target
2912c0276f427922a5a78174f145cb83c9f3e3ade44897ae5119479cb34de808
-
Size
1.0MB
-
Sample
230523-ysevgshb94
-
MD5
0803efe336e76586c32b64db63006133
-
SHA1
7f22d7ca0efd06663474b89be2a68016862c3c3a
-
SHA256
2912c0276f427922a5a78174f145cb83c9f3e3ade44897ae5119479cb34de808
-
SHA512
fc3761af48c5866a3e5532968fddd3afaf5ee3123c75db4d98cc0994729e32a1b591a00db726cf1b0c50fe0ed7d3c2e6f233bc9147c8c3dd3805050600c0c138
-
SSDEEP
24576:Kynk7T0eGbnwQvTHD4/GFHzNm96EMJTGvfbTk:Rk7Tyn0GFTsokvfbT
Static task
static1
Behavioral task
behavioral1
Sample
2912c0276f427922a5a78174f145cb83c9f3e3ade44897ae5119479cb34de808.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Targets
-
-
Target
2912c0276f427922a5a78174f145cb83c9f3e3ade44897ae5119479cb34de808
-
Size
1.0MB
-
MD5
0803efe336e76586c32b64db63006133
-
SHA1
7f22d7ca0efd06663474b89be2a68016862c3c3a
-
SHA256
2912c0276f427922a5a78174f145cb83c9f3e3ade44897ae5119479cb34de808
-
SHA512
fc3761af48c5866a3e5532968fddd3afaf5ee3123c75db4d98cc0994729e32a1b591a00db726cf1b0c50fe0ed7d3c2e6f233bc9147c8c3dd3805050600c0c138
-
SSDEEP
24576:Kynk7T0eGbnwQvTHD4/GFHzNm96EMJTGvfbTk:Rk7Tyn0GFTsokvfbT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-