General
-
Target
73dea00313378b51f254e4db70c4e63bdd128eb061f806d3bbf3a6e3b32b5af8
-
Size
764KB
-
Sample
230526-nem9laff7w
-
MD5
620169ddb18f5f71d732c1cbfb2f2272
-
SHA1
b1f8ba71ee3ba9b88c1893d3f74b49b7f39b5404
-
SHA256
73dea00313378b51f254e4db70c4e63bdd128eb061f806d3bbf3a6e3b32b5af8
-
SHA512
0839e695038a3e8d0d6bfc03a950df5ee745112a279f1c159d4faacaeac72cd34f54409c72280f26e242a8743f84823948c939e27f44996a58730dc052706293
-
SSDEEP
12288:PMrly90GKzFCXnDX6uWDK/JhTpILJJxg8m4Jx+JcWPzKtVtZNKB+3g1II4d06mdF:qyEzQmuW4vTpIVYlJcW7KtVtjHg194+d
Static task
static1
Behavioral task
behavioral1
Sample
73dea00313378b51f254e4db70c4e63bdd128eb061f806d3bbf3a6e3b32b5af8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
misa
83.97.73.122:19062
-
auth_value
9e79529a6bdb4962f44d12b0d6d62d32
Extracted
redline
goga
83.97.73.122:19062
-
auth_value
6d57dff6d3c42dddb8a76dc276b8467f
Targets
-
-
Target
73dea00313378b51f254e4db70c4e63bdd128eb061f806d3bbf3a6e3b32b5af8
-
Size
764KB
-
MD5
620169ddb18f5f71d732c1cbfb2f2272
-
SHA1
b1f8ba71ee3ba9b88c1893d3f74b49b7f39b5404
-
SHA256
73dea00313378b51f254e4db70c4e63bdd128eb061f806d3bbf3a6e3b32b5af8
-
SHA512
0839e695038a3e8d0d6bfc03a950df5ee745112a279f1c159d4faacaeac72cd34f54409c72280f26e242a8743f84823948c939e27f44996a58730dc052706293
-
SSDEEP
12288:PMrly90GKzFCXnDX6uWDK/JhTpILJJxg8m4Jx+JcWPzKtVtZNKB+3g1II4d06mdF:qyEzQmuW4vTpIVYlJcW7KtVtjHg194+d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Data from Local System
1Command and Control
Credential Access
Credentials in Files
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Modify Existing Service
1Scheduled Task
1Registry Run Keys / Startup Folder
1Privilege Escalation