General
-
Target
edee78838116101d87ece63cb61c16032c8dce0176e9981dd3f6aa13a832b482
-
Size
916KB
-
Sample
230524-gr3fqabf6s
-
MD5
b218cde1816f25aa0370f44bba650e0b
-
SHA1
ee5808829b3e73354be37e1c16db02b7eba2ef51
-
SHA256
edee78838116101d87ece63cb61c16032c8dce0176e9981dd3f6aa13a832b482
-
SHA512
f3a48745397b6bdefdc98d01493446705efc48b76212ea9b3339f71ce35bbaad556eee32ed243e144e256d18b82f96a575f598e45628ecb67a15419613f62d72
-
SSDEEP
12288:uMrWy90Suugxmak3krKuGAcUSUgQAjKsytcBOeevka8gB60Wr2KOzejs5W8uudMe:MyPIkUn+UhMAe10kavwCeQ5W8xynka4
Static task
static1
Behavioral task
behavioral1
Sample
edee78838116101d87ece63cb61c16032c8dce0176e9981dd3f6aa13a832b482.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
edee78838116101d87ece63cb61c16032c8dce0176e9981dd3f6aa13a832b482
-
Size
916KB
-
MD5
b218cde1816f25aa0370f44bba650e0b
-
SHA1
ee5808829b3e73354be37e1c16db02b7eba2ef51
-
SHA256
edee78838116101d87ece63cb61c16032c8dce0176e9981dd3f6aa13a832b482
-
SHA512
f3a48745397b6bdefdc98d01493446705efc48b76212ea9b3339f71ce35bbaad556eee32ed243e144e256d18b82f96a575f598e45628ecb67a15419613f62d72
-
SSDEEP
12288:uMrWy90Suugxmak3krKuGAcUSUgQAjKsytcBOeevka8gB60Wr2KOzejs5W8uudMe:MyPIkUn+UhMAe10kavwCeQ5W8xynka4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-