General
-
Target
efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f
-
Size
1.0MB
-
Sample
230525-p8zedsac44
-
MD5
652ac3fc627354ff5cc6d2017e428c5e
-
SHA1
d80a29ea73de2f9d61ffd857aaca71d9e0c86d0a
-
SHA256
efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f
-
SHA512
774c49d07bbb1c5ab36b1a1d091af042fa730b33f2ba3719a83cea99ab479d6e4e2cae38a6189e842a76bea01d4c6ea4ea19fd945776c509d23f7c3b58a1592e
-
SSDEEP
24576:+yGOTFSS1woUf8rKmDpjd5sBvy8GOUGGBTnDgY5G+0cfJoeq:NGOTFSuy8rKSjdiBvjUGGBTnc2G8
Static task
static1
Behavioral task
behavioral1
Sample
efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Targets
-
-
Target
efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f
-
Size
1.0MB
-
MD5
652ac3fc627354ff5cc6d2017e428c5e
-
SHA1
d80a29ea73de2f9d61ffd857aaca71d9e0c86d0a
-
SHA256
efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f
-
SHA512
774c49d07bbb1c5ab36b1a1d091af042fa730b33f2ba3719a83cea99ab479d6e4e2cae38a6189e842a76bea01d4c6ea4ea19fd945776c509d23f7c3b58a1592e
-
SSDEEP
24576:+yGOTFSS1woUf8rKmDpjd5sBvy8GOUGGBTnDgY5G+0cfJoeq:NGOTFSuy8rKSjdiBvjUGGBTnc2G8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-