General
-
Target
7c481c114642e954d9aec667d419f024649a703ced55470cb1724f43fea0d3ae
-
Size
761KB
-
Sample
230527-sek7fscf5y
-
MD5
663cb83cd45d1edd7fa8814cf2a594c1
-
SHA1
af5711b5914b7413eb7d3fae2007593599c1c73a
-
SHA256
7c481c114642e954d9aec667d419f024649a703ced55470cb1724f43fea0d3ae
-
SHA512
19e7b420b2d385ddcf41ce78f0d068ab96bd915af654de43a307c99cf7abd36978e973cc6e0dab1fde718c0a59371dd131e733dc689ec353c3caaf98fb27c6d2
-
SSDEEP
12288:LMrJy90uS3FU359AXqjaU0apZHiXmNJUD1VI59jmMtjkudCNCY0TAKXzWnC1L:ayOU6XqwMC2NyD1OScjBdCNVKXzWCZ
Static task
static1
Behavioral task
behavioral1
Sample
7c481c114642e954d9aec667d419f024649a703ced55470cb1724f43fea0d3ae.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19062
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
munder
83.97.73.127:19062
-
auth_value
159bf350f6393f0d879c80a22059fba2
Targets
-
-
Target
7c481c114642e954d9aec667d419f024649a703ced55470cb1724f43fea0d3ae
-
Size
761KB
-
MD5
663cb83cd45d1edd7fa8814cf2a594c1
-
SHA1
af5711b5914b7413eb7d3fae2007593599c1c73a
-
SHA256
7c481c114642e954d9aec667d419f024649a703ced55470cb1724f43fea0d3ae
-
SHA512
19e7b420b2d385ddcf41ce78f0d068ab96bd915af654de43a307c99cf7abd36978e973cc6e0dab1fde718c0a59371dd131e733dc689ec353c3caaf98fb27c6d2
-
SSDEEP
12288:LMrJy90uS3FU359AXqjaU0apZHiXmNJUD1VI59jmMtjkudCNCY0TAKXzWnC1L:ayOU6XqwMC2NyD1OScjBdCNVKXzWCZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-