General
-
Target
b35a9c298634ae94b70023d5c9db0d720bc1388c189b4061a2f9d38f607a8ab3
-
Size
761KB
-
Sample
230527-tbz2wacg5t
-
MD5
3b22674463257fd7edf40884e8886530
-
SHA1
70fc6b76c59e05899f65ef1bb43daf448513a171
-
SHA256
b35a9c298634ae94b70023d5c9db0d720bc1388c189b4061a2f9d38f607a8ab3
-
SHA512
4ad6994e33f24e9441a2d798372df40255448b4d8e65ee4b35bbdbcc954cdd912a741ca2254638d1808ce801ec95eb4ee4b2832ddb8fdf043afe3615ee4ddce8
-
SSDEEP
12288:7Mrzy90NnGK6BhOvex5VQci2gI88bLA7YaEX738UvcHbU4r4QNYvEv0Y5FK:syeGK6r5ti2giA7Yam38pH10QNYs0MK
Static task
static1
Behavioral task
behavioral1
Sample
b35a9c298634ae94b70023d5c9db0d720bc1388c189b4061a2f9d38f607a8ab3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dura
83.97.73.127:19062
-
auth_value
44b7d6fb9572dea0d64d018139c3d208
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
b35a9c298634ae94b70023d5c9db0d720bc1388c189b4061a2f9d38f607a8ab3
-
Size
761KB
-
MD5
3b22674463257fd7edf40884e8886530
-
SHA1
70fc6b76c59e05899f65ef1bb43daf448513a171
-
SHA256
b35a9c298634ae94b70023d5c9db0d720bc1388c189b4061a2f9d38f607a8ab3
-
SHA512
4ad6994e33f24e9441a2d798372df40255448b4d8e65ee4b35bbdbcc954cdd912a741ca2254638d1808ce801ec95eb4ee4b2832ddb8fdf043afe3615ee4ddce8
-
SSDEEP
12288:7Mrzy90NnGK6BhOvex5VQci2gI88bLA7YaEX738UvcHbU4r4QNYvEv0Y5FK:syeGK6r5ti2giA7Yam38pH10QNYs0MK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-