General
-
Target
696ddc25332002f76a81e55dabbae326b10d887da54596ceea43c197ffb894df
-
Size
768KB
-
Sample
230526-bpghksdb98
-
MD5
1ea4d0854bab6260a72af9cba4ba06bc
-
SHA1
05792a6465a660d221de26c786e2adf3b0466d70
-
SHA256
696ddc25332002f76a81e55dabbae326b10d887da54596ceea43c197ffb894df
-
SHA512
580953d351d640ab069baca282a7517bde9079d6671aeb6179558c76ef19d1c9575d5e69e93317d4e8a407ddc9a3b6a415e71bcb2a612fa1324350ea3b2db296
-
SSDEEP
12288:RMrDy90ZbDaYDYF3VBHWn3Afg2d6McoWSkB8HnMMtIW+zE4Dy:yyI6YkhVZWnQfddkuHMM1+FDy
Static task
static1
Behavioral task
behavioral1
Sample
696ddc25332002f76a81e55dabbae326b10d887da54596ceea43c197ffb894df.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
696ddc25332002f76a81e55dabbae326b10d887da54596ceea43c197ffb894df
-
Size
768KB
-
MD5
1ea4d0854bab6260a72af9cba4ba06bc
-
SHA1
05792a6465a660d221de26c786e2adf3b0466d70
-
SHA256
696ddc25332002f76a81e55dabbae326b10d887da54596ceea43c197ffb894df
-
SHA512
580953d351d640ab069baca282a7517bde9079d6671aeb6179558c76ef19d1c9575d5e69e93317d4e8a407ddc9a3b6a415e71bcb2a612fa1324350ea3b2db296
-
SSDEEP
12288:RMrDy90ZbDaYDYF3VBHWn3Afg2d6McoWSkB8HnMMtIW+zE4Dy:yyI6YkhVZWnQfddkuHMM1+FDy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-