General
-
Target
c16a99058573060cb1cf382ec56ef8167a5a88ab6d618615ca9ac8d69154563d
-
Size
916KB
-
Sample
230524-dmhnzaad93
-
MD5
560a45d87eee1903914b7449c8e9f577
-
SHA1
25c103701ae75e73103b5b01801d3909f9a89897
-
SHA256
c16a99058573060cb1cf382ec56ef8167a5a88ab6d618615ca9ac8d69154563d
-
SHA512
5050a10b680808fb12184597a632870d3db8b33911a5dc12a2778bd7f9b54feeb89483427d2e6a002a8c7de0742f8395a66ed645fb5fbe2fd254bc5aef1be754
-
SSDEEP
24576:uyYHJyIBOqDZuVzwT0IiH8LgktOdI6tFFvk:9qDjDZk1cLghJtFFv
Static task
static1
Behavioral task
behavioral1
Sample
c16a99058573060cb1cf382ec56ef8167a5a88ab6d618615ca9ac8d69154563d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Targets
-
-
Target
c16a99058573060cb1cf382ec56ef8167a5a88ab6d618615ca9ac8d69154563d
-
Size
916KB
-
MD5
560a45d87eee1903914b7449c8e9f577
-
SHA1
25c103701ae75e73103b5b01801d3909f9a89897
-
SHA256
c16a99058573060cb1cf382ec56ef8167a5a88ab6d618615ca9ac8d69154563d
-
SHA512
5050a10b680808fb12184597a632870d3db8b33911a5dc12a2778bd7f9b54feeb89483427d2e6a002a8c7de0742f8395a66ed645fb5fbe2fd254bc5aef1be754
-
SSDEEP
24576:uyYHJyIBOqDZuVzwT0IiH8LgktOdI6tFFvk:9qDjDZk1cLghJtFFv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-