General
-
Target
b0fe7e463bcbd8c29cadb922d4b3a2a1.exe
-
Size
771KB
-
Sample
230527-hfr2aaba36
-
MD5
b0fe7e463bcbd8c29cadb922d4b3a2a1
-
SHA1
6ceb5d11c21df17917d547dbe7bb45b20b118f7a
-
SHA256
24757d8a949a1fb3f447ffccafd73a10baca77809c6ffc10c78d1b4e991bbbd4
-
SHA512
2a1d53c83c61e525ad530e315c2f3fcb7af675bf56b7642d9b43b5a3e33e83299fe0bf37e993b671342416e79374b85baf7b35ec6fa29bcaf8d8c59828ffac07
-
SSDEEP
12288:kMrCy90suFQAafXQWipseRjUVSrs9epcdZIi0D1rRFBlVUm8T9l3+EULk3NT8S1s:myf+afasBsIgCQlt+m8S5k3KS1s
Static task
static1
Behavioral task
behavioral1
Sample
b0fe7e463bcbd8c29cadb922d4b3a2a1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b0fe7e463bcbd8c29cadb922d4b3a2a1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19062
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
munder
83.97.73.127:19062
-
auth_value
159bf350f6393f0d879c80a22059fba2
Targets
-
-
Target
b0fe7e463bcbd8c29cadb922d4b3a2a1.exe
-
Size
771KB
-
MD5
b0fe7e463bcbd8c29cadb922d4b3a2a1
-
SHA1
6ceb5d11c21df17917d547dbe7bb45b20b118f7a
-
SHA256
24757d8a949a1fb3f447ffccafd73a10baca77809c6ffc10c78d1b4e991bbbd4
-
SHA512
2a1d53c83c61e525ad530e315c2f3fcb7af675bf56b7642d9b43b5a3e33e83299fe0bf37e993b671342416e79374b85baf7b35ec6fa29bcaf8d8c59828ffac07
-
SSDEEP
12288:kMrCy90suFQAafXQWipseRjUVSrs9epcdZIi0D1rRFBlVUm8T9l3+EULk3NT8S1s:myf+afasBsIgCQlt+m8S5k3KS1s
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-