General
-
Target
989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3
-
Size
767KB
-
Sample
230525-xlxlaabg98
-
MD5
3e04921009ac79e49d76e4fef9e5242b
-
SHA1
c5bcc21e825fe0aea60d4428bbb9ef1c120c0c49
-
SHA256
989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3
-
SHA512
1ee1f72afc36e3b68277ec930a82b1be3c17c5fcaa71dd51043a10b89879996116b39f1e35fba3663fe2c3ca3566f85168e318b7fa922c28b42db4369d32934d
-
SSDEEP
12288:fMrYy90CHvPTJ8dgJkAQCa4t/HNf6ZJ6KMQ1pegVrNXwPsg4ZWSkBsXnMMtIW+XT:/y3mdgJkgaMHNCZJdMqeYwP/4ZdkiXMh
Static task
static1
Behavioral task
behavioral1
Sample
989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3
-
Size
767KB
-
MD5
3e04921009ac79e49d76e4fef9e5242b
-
SHA1
c5bcc21e825fe0aea60d4428bbb9ef1c120c0c49
-
SHA256
989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3
-
SHA512
1ee1f72afc36e3b68277ec930a82b1be3c17c5fcaa71dd51043a10b89879996116b39f1e35fba3663fe2c3ca3566f85168e318b7fa922c28b42db4369d32934d
-
SSDEEP
12288:fMrYy90CHvPTJ8dgJkAQCa4t/HNf6ZJ6KMQ1pegVrNXwPsg4ZWSkBsXnMMtIW+XT:/y3mdgJkgaMHNCZJdMqeYwP/4ZdkiXMh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-