General
-
Target
71a820e5078fe73c522ba48b83bbf4050f490b63c80c10f785d3d4421aaae9c9
-
Size
771KB
-
Sample
230526-2fjvfshh2v
-
MD5
423fa2f66cea6011c2274937d65f51cd
-
SHA1
2f41ec0cecb88836ca27bd499a7eda4d89182682
-
SHA256
71a820e5078fe73c522ba48b83bbf4050f490b63c80c10f785d3d4421aaae9c9
-
SHA512
1624d939f37796024d05b9bd9b8e91ab5da1f87e569d518e9b1a2f8d65a5c5d3e7df30c474842d808fb19cc2ad74f795cb66eded8926fc00f5a1423ffa07ee5f
-
SSDEEP
12288:xMrCy90uKVxQWGWoRrpowISAt2b1MDVLBszdwYLd0L1h/VkT/kUjDU8:3yXKXIponAbyDVLBsznLd07ibxjg8
Static task
static1
Behavioral task
behavioral1
Sample
71a820e5078fe73c522ba48b83bbf4050f490b63c80c10f785d3d4421aaae9c9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
disa
83.97.73.122:19062
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Extracted
redline
goga
83.97.73.122:19062
-
auth_value
6d57dff6d3c42dddb8a76dc276b8467f
Targets
-
-
Target
71a820e5078fe73c522ba48b83bbf4050f490b63c80c10f785d3d4421aaae9c9
-
Size
771KB
-
MD5
423fa2f66cea6011c2274937d65f51cd
-
SHA1
2f41ec0cecb88836ca27bd499a7eda4d89182682
-
SHA256
71a820e5078fe73c522ba48b83bbf4050f490b63c80c10f785d3d4421aaae9c9
-
SHA512
1624d939f37796024d05b9bd9b8e91ab5da1f87e569d518e9b1a2f8d65a5c5d3e7df30c474842d808fb19cc2ad74f795cb66eded8926fc00f5a1423ffa07ee5f
-
SSDEEP
12288:xMrCy90uKVxQWGWoRrpowISAt2b1MDVLBszdwYLd0L1h/VkT/kUjDU8:3yXKXIponAbyDVLBsznLd07ibxjg8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-