General
-
Target
4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504
-
Size
767KB
-
Sample
230525-3sbkaadf3y
-
MD5
d18878a5435ee53450549be50879733d
-
SHA1
caeaa92ac4f5e8730acb5db838550a9fb4497ca9
-
SHA256
4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504
-
SHA512
2922d044eefc5580115d55c22bb848883cfd5dfa03903038ac8bd6e0c00868ffc67c6cf6f7b3f667a94d73d012ee52abcc2498612fa0512ccba920772b64b638
-
SSDEEP
12288:2MrNy90AVSQICR8YYZ7A6Jr0MC43SPsOfOkx4y8tZmbwn0kBHVnMLtIW+gEWZQ:PyPiCR8YyAiryESUix4y8tZ0w0kxVML2
Static task
static1
Behavioral task
behavioral1
Sample
4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504
-
Size
767KB
-
MD5
d18878a5435ee53450549be50879733d
-
SHA1
caeaa92ac4f5e8730acb5db838550a9fb4497ca9
-
SHA256
4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504
-
SHA512
2922d044eefc5580115d55c22bb848883cfd5dfa03903038ac8bd6e0c00868ffc67c6cf6f7b3f667a94d73d012ee52abcc2498612fa0512ccba920772b64b638
-
SSDEEP
12288:2MrNy90AVSQICR8YYZ7A6Jr0MC43SPsOfOkx4y8tZmbwn0kBHVnMLtIW+gEWZQ:PyPiCR8YyAiryESUix4y8tZ0w0kxVML2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-