General
-
Target
21c47a12724399f2a3bea4bf4067fd084dfc7e9d92e3c80de9cf8cc05cf3ffc3
-
Size
768KB
-
Sample
230526-fs92hsee5t
-
MD5
570e5ed8da27b13b346d9df585fecc03
-
SHA1
fe9c6d9a01f72f0dceb43c59a1062d29f1ee2a36
-
SHA256
21c47a12724399f2a3bea4bf4067fd084dfc7e9d92e3c80de9cf8cc05cf3ffc3
-
SHA512
4ed3cf8e15ed27e0ac2bb8cc8ec6a143b36fdbdfc27c717554e69a1f44685fea57b1e851bd58fb0515356de3089542a18f25d92542a516fb5f662e0769e6e516
-
SSDEEP
12288:LMr/y90mLzWfqxfbsZe4GE+XRDtOLaXyKJoZMzmojMNlPVTvGkBcWnM8tIW+tEuU:Iy7zlsZbfERDtJXmM9CVTukuWM81+goQ
Static task
static1
Behavioral task
behavioral1
Sample
21c47a12724399f2a3bea4bf4067fd084dfc7e9d92e3c80de9cf8cc05cf3ffc3.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
21c47a12724399f2a3bea4bf4067fd084dfc7e9d92e3c80de9cf8cc05cf3ffc3
-
Size
768KB
-
MD5
570e5ed8da27b13b346d9df585fecc03
-
SHA1
fe9c6d9a01f72f0dceb43c59a1062d29f1ee2a36
-
SHA256
21c47a12724399f2a3bea4bf4067fd084dfc7e9d92e3c80de9cf8cc05cf3ffc3
-
SHA512
4ed3cf8e15ed27e0ac2bb8cc8ec6a143b36fdbdfc27c717554e69a1f44685fea57b1e851bd58fb0515356de3089542a18f25d92542a516fb5f662e0769e6e516
-
SSDEEP
12288:LMr/y90mLzWfqxfbsZe4GE+XRDtOLaXyKJoZMzmojMNlPVTvGkBcWnM8tIW+tEuU:Iy7zlsZbfERDtJXmM9CVTukuWM81+goQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-