General
-
Target
c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e
-
Size
1.0MB
-
Sample
230525-q4256abb6w
-
MD5
32b88f66ed05dfb4c1f85f7652125e66
-
SHA1
aa04333e92ef50f445002fccc79816dd420db6b3
-
SHA256
c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e
-
SHA512
4646c089add169559144d2d871fbee00c47bc1686fca00f8d14752e8a747b9bd50184ee097f478926635187c51cdd66adc1a77f72025cdf43be81aa6b7bcdf8a
-
SSDEEP
24576:dyj3BhBj8fbUp6VWHu0pf9FoZnvPUYrwAWh/if:4j3BXjtU4HkJ4q
Static task
static1
Behavioral task
behavioral1
Sample
c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lina
83.97.73.122:19062
-
auth_value
13523aee5d194d7716b22eeab7de10ad
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Extracted
gurcu
https://api.telegram.org/bot6237712604:AAESgAGfaQ0EUC8eWgMd7kpAW_FEGRDRfDs/sendMessage?chat_id=880824160
Targets
-
-
Target
c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e
-
Size
1.0MB
-
MD5
32b88f66ed05dfb4c1f85f7652125e66
-
SHA1
aa04333e92ef50f445002fccc79816dd420db6b3
-
SHA256
c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e
-
SHA512
4646c089add169559144d2d871fbee00c47bc1686fca00f8d14752e8a747b9bd50184ee097f478926635187c51cdd66adc1a77f72025cdf43be81aa6b7bcdf8a
-
SSDEEP
24576:dyj3BhBj8fbUp6VWHu0pf9FoZnvPUYrwAWh/if:4j3BXjtU4HkJ4q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-