General
-
Target
6992e948c973e10e701b2069fc8a50d1.exe
-
Size
767KB
-
Sample
230525-wr1z8acc7w
-
MD5
6992e948c973e10e701b2069fc8a50d1
-
SHA1
ea5f7f816c970df9e1436427ba89cbaa23312f3c
-
SHA256
c18d461cd880e179ec078722740b182ece28ff886fc63711a906e473bc83d750
-
SHA512
53a1b36abeaff771d0c0b4117b7521a877f3e85c0c85d576e8a1ba1cef14e66ce415576dd8b83392da3703f1f8bf0855b43702bd0ded716baf1d3350a2c9c945
-
SSDEEP
12288:oMrPy903jRGGvqlXLeNkLshwQrGun8uOlr0e3mHybRNgS+fTavCsjWvEzM:3ysY+YbeOshHrGu5DsRNf+bpsjVM
Static task
static1
Behavioral task
behavioral1
Sample
6992e948c973e10e701b2069fc8a50d1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6992e948c973e10e701b2069fc8a50d1.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Targets
-
-
Target
6992e948c973e10e701b2069fc8a50d1.exe
-
Size
767KB
-
MD5
6992e948c973e10e701b2069fc8a50d1
-
SHA1
ea5f7f816c970df9e1436427ba89cbaa23312f3c
-
SHA256
c18d461cd880e179ec078722740b182ece28ff886fc63711a906e473bc83d750
-
SHA512
53a1b36abeaff771d0c0b4117b7521a877f3e85c0c85d576e8a1ba1cef14e66ce415576dd8b83392da3703f1f8bf0855b43702bd0ded716baf1d3350a2c9c945
-
SSDEEP
12288:oMrPy903jRGGvqlXLeNkLshwQrGun8uOlr0e3mHybRNgS+fTavCsjWvEzM:3ysY+YbeOshHrGu5DsRNf+bpsjVM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-