General
-
Target
a7580c3b637b6f943cd6cb320e025353.bin
-
Size
986KB
-
Sample
230525-b5j9eagb5s
-
MD5
cffda98b65f3af6767de7fd39b520d5e
-
SHA1
4ef93c4b660eeb5426bcf483e54f625bd1f9d9ca
-
SHA256
2f4e77436c8abbd27320f3bdf7e8122e4cdafe1b0a67ec96b9ea0571ae39f221
-
SHA512
7e9d9f4e05221745c26689c28ee3b4756f2a45710bcf406e647eb24325efaeb5aee6dd884f64764074b06481e1ce59cf0d880d35cffb331249660714b000f28c
-
SSDEEP
24576:Pz2fETHNjbX3wpG0S4fDzAA8IOj0Kkzi9HXDpRWRaWA0wy:Pz2AHtXwlBt209i9HXDpRWwWA0wy
Static task
static1
Behavioral task
behavioral1
Sample
bc6427c3a0718dca2938a10770e736ae7c56423f4a93682270fb5780e2281a84.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bc6427c3a0718dca2938a10770e736ae7c56423f4a93682270fb5780e2281a84.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
bc6427c3a0718dca2938a10770e736ae7c56423f4a93682270fb5780e2281a84.exe
-
Size
1.0MB
-
MD5
a7580c3b637b6f943cd6cb320e025353
-
SHA1
10cfe691651148d4533a9eac9113be7c4a72e09e
-
SHA256
bc6427c3a0718dca2938a10770e736ae7c56423f4a93682270fb5780e2281a84
-
SHA512
edaec164687aab03bd039a191eedc06aa496d823c042f452212e1a97d273204f298a30efa0d69b8aa7b9e2ae24edd1ffe3412a8305a2db6d0d3b2837304a358c
-
SSDEEP
24576:hyOnYg8TbomV77vPOxoNbT/p9sBIO1QAa9cgIJ:UOYnbTVXOxoNbTp9IfmVc5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-