General
-
Target
6eb7ab2dea39b0239b62e4a305661198c3df9b8d62729c1c5704cedf4c639cfc
-
Size
770KB
-
Sample
230527-llpd5abg91
-
MD5
d872b16ae255a0f48f67ec1a8a1ada2b
-
SHA1
f2a3ac34880f601f9312e91a38374a83078c56d4
-
SHA256
6eb7ab2dea39b0239b62e4a305661198c3df9b8d62729c1c5704cedf4c639cfc
-
SHA512
a69280c6d7bfebfe540fb6a8f16dd88566c04be943e1d06242ce0c50c1dc2d1d3953f29915f102a2181923f12e83cee73af123eb5a749df660891cc500cc5bf1
-
SSDEEP
24576:XyPICGuQ+v63eJhzZEOrvIMSzGGY8xhk3/Spwz:ij9y3eJxNYyxWcKi
Static task
static1
Behavioral task
behavioral1
Sample
6eb7ab2dea39b0239b62e4a305661198c3df9b8d62729c1c5704cedf4c639cfc.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19062
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
munder
83.97.73.127:19062
-
auth_value
159bf350f6393f0d879c80a22059fba2
Targets
-
-
Target
6eb7ab2dea39b0239b62e4a305661198c3df9b8d62729c1c5704cedf4c639cfc
-
Size
770KB
-
MD5
d872b16ae255a0f48f67ec1a8a1ada2b
-
SHA1
f2a3ac34880f601f9312e91a38374a83078c56d4
-
SHA256
6eb7ab2dea39b0239b62e4a305661198c3df9b8d62729c1c5704cedf4c639cfc
-
SHA512
a69280c6d7bfebfe540fb6a8f16dd88566c04be943e1d06242ce0c50c1dc2d1d3953f29915f102a2181923f12e83cee73af123eb5a749df660891cc500cc5bf1
-
SSDEEP
24576:XyPICGuQ+v63eJhzZEOrvIMSzGGY8xhk3/Spwz:ij9y3eJxNYyxWcKi
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-