General
-
Target
aaa4b3f791df3ef26006de4454e1b4b452b86a3e7893185c06a0e7166ff05a51
-
Size
1.0MB
-
Sample
230527-jegdtsbe2t
-
MD5
59d31755e9d0db71f00c5a7455dc2156
-
SHA1
e6caff8a00c59350cf1dc2f1a7b4444f3b2d50ed
-
SHA256
aaa4b3f791df3ef26006de4454e1b4b452b86a3e7893185c06a0e7166ff05a51
-
SHA512
d5c99322dd1cb127a27db782c9d9bfe73a8cc387689c8cf86fa46e54b10ba8c3863a9d3e4a89ab63a4a1ef97acf04dc829072acf089f4ffbf188b60769ddb5ed
-
SSDEEP
24576:ZyA4Cjp7ys/nVXyuwZyrFk3qSu+X0j0QRM5A+fy21Z:MaXVXlH0N5EjjMG+
Static task
static1
Behavioral task
behavioral1
Sample
aaa4b3f791df3ef26006de4454e1b4b452b86a3e7893185c06a0e7166ff05a51.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lusa
83.97.73.127:19062
-
auth_value
c9df946711e01c378b42221de692acbd
Extracted
redline
munder
83.97.73.127:19062
-
auth_value
159bf350f6393f0d879c80a22059fba2
Targets
-
-
Target
aaa4b3f791df3ef26006de4454e1b4b452b86a3e7893185c06a0e7166ff05a51
-
Size
1.0MB
-
MD5
59d31755e9d0db71f00c5a7455dc2156
-
SHA1
e6caff8a00c59350cf1dc2f1a7b4444f3b2d50ed
-
SHA256
aaa4b3f791df3ef26006de4454e1b4b452b86a3e7893185c06a0e7166ff05a51
-
SHA512
d5c99322dd1cb127a27db782c9d9bfe73a8cc387689c8cf86fa46e54b10ba8c3863a9d3e4a89ab63a4a1ef97acf04dc829072acf089f4ffbf188b60769ddb5ed
-
SSDEEP
24576:ZyA4Cjp7ys/nVXyuwZyrFk3qSu+X0j0QRM5A+fy21Z:MaXVXlH0N5EjjMG+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-