General
-
Target
8c7baef9e6b9f0465e3dda59296f04ea1980b77630d684c0feb457b5edae6df2
-
Size
916KB
-
Sample
230524-c2afgaad48
-
MD5
fd0c33f6420cd0d33eca79d731396f69
-
SHA1
6698b3370d440bc44da544b75805ecb3927635bd
-
SHA256
8c7baef9e6b9f0465e3dda59296f04ea1980b77630d684c0feb457b5edae6df2
-
SHA512
f4b2b7216bfaefadf8f020e6b31f827b0a55600e407894fd155ccb8c3ff7f26211c13ee1f9183afb33ee7df04e4696fbe699d2979b035993c2eee0190b4417a9
-
SSDEEP
12288:EMr2y90OmN8DR9nM80WwU+3UpOiwzaz01MjZSZqs/SeLMZMqQ7qGhhm83nD:6yxJRK8c5FiwzVMVSCeq983nD
Static task
static1
Behavioral task
behavioral1
Sample
8c7baef9e6b9f0465e3dda59296f04ea1980b77630d684c0feb457b5edae6df2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Targets
-
-
Target
8c7baef9e6b9f0465e3dda59296f04ea1980b77630d684c0feb457b5edae6df2
-
Size
916KB
-
MD5
fd0c33f6420cd0d33eca79d731396f69
-
SHA1
6698b3370d440bc44da544b75805ecb3927635bd
-
SHA256
8c7baef9e6b9f0465e3dda59296f04ea1980b77630d684c0feb457b5edae6df2
-
SHA512
f4b2b7216bfaefadf8f020e6b31f827b0a55600e407894fd155ccb8c3ff7f26211c13ee1f9183afb33ee7df04e4696fbe699d2979b035993c2eee0190b4417a9
-
SSDEEP
12288:EMr2y90OmN8DR9nM80WwU+3UpOiwzaz01MjZSZqs/SeLMZMqQ7qGhhm83nD:6yxJRK8c5FiwzVMVSCeq983nD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-