General
-
Target
d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df
-
Size
767KB
-
Sample
230526-c94z2sde44
-
MD5
13cfc01dec8cf32d264662197ad8e378
-
SHA1
aea740c5981485b2b0ab5a3fe715b4995610ea11
-
SHA256
d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df
-
SHA512
73c3e0a1ff24028594445bacfb2c185ecebf38d25d0182176f35bc012740b25a2029aec5a908d55aac9510f2c27ac4f09ab2ddb57430569d0640b342f24a5df8
-
SSDEEP
12288:aMrNy90WFq0/OGlUdUv1fIQtnof3qxo+rNtvdvBHvGkBugnM8tIW+TE0gn6nK:vyrWuUdU1QanoPqh/ukkgM81+mN
Static task
static1
Behavioral task
behavioral1
Sample
d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df
-
Size
767KB
-
MD5
13cfc01dec8cf32d264662197ad8e378
-
SHA1
aea740c5981485b2b0ab5a3fe715b4995610ea11
-
SHA256
d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df
-
SHA512
73c3e0a1ff24028594445bacfb2c185ecebf38d25d0182176f35bc012740b25a2029aec5a908d55aac9510f2c27ac4f09ab2ddb57430569d0640b342f24a5df8
-
SSDEEP
12288:aMrNy90WFq0/OGlUdUv1fIQtnof3qxo+rNtvdvBHvGkBugnM8tIW+TE0gn6nK:vyrWuUdU1QanoPqh/ukkgM81+mN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-