General
-
Target
ad7297deeb0217da6b8657774439344f.bin
-
Size
975KB
-
Sample
230525-b5ph5afg23
-
MD5
aa5e8633d83efe3e5b75e617a44a8890
-
SHA1
af79b9b5147f362630c4fd0f4d33e66d1766238c
-
SHA256
252ab674b84bec47f9c32cf7f24b6ccea7649431faaae3d3594a5bf5931ea1d6
-
SHA512
b82cc67dfc245cd739126a16fcb97f107e218628e1dea807012e2fb27acd8e5836cda4bf653a5e18fa6210b02c9dbcb76821c3b68cf15b34c3c589a0db840a96
-
SSDEEP
24576:X+LGZyx6yldpfgXmyeAPDGDIkUwUCX0MldNVhUF7sdg2kHAp:X+xNdpoXNeAPDHukkdN05Z2kHAp
Static task
static1
Behavioral task
behavioral1
Sample
596ec02783081f039a5255feaa13d59715819b7e6a9d1880728867499f5f7897.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
596ec02783081f039a5255feaa13d59715819b7e6a9d1880728867499f5f7897.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Targets
-
-
Target
596ec02783081f039a5255feaa13d59715819b7e6a9d1880728867499f5f7897.exe
-
Size
1020KB
-
MD5
ad7297deeb0217da6b8657774439344f
-
SHA1
a0b00abb3a0e635e5bc22edfa231232f5e57f711
-
SHA256
596ec02783081f039a5255feaa13d59715819b7e6a9d1880728867499f5f7897
-
SHA512
fc5899b37fecc2e1171b71bc613fddf864c1258b2d3130a73dd1fbb69039d5e98cba207a8a4158a9e8b79f7c3aeecefe751c8186672647e6d17f15221dd075b0
-
SSDEEP
24576:uyHm4vPDLgA+8hmvOTYDKZow+BwwKYoiZdIR:9HZgx8PRZow+6qo4dI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-