General
-
Target
df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba
-
Size
760KB
-
Sample
230527-tqcvwscg9w
-
MD5
d3e12f0c7de252f808ff05faa781775f
-
SHA1
a607a9eb4deeb8b418077180663482ee7f5f5106
-
SHA256
df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba
-
SHA512
cdfa02fc77d1a15d6c0fa94595e48943d04a85f9c50402dcd5cc66f2b4b79c33dd0114cc660606c89c1ea1f2e4b4af8c42eea1993a4b59c017ee1d17dfa0705c
-
SSDEEP
12288:xMrfy90bUsN4BTt3qds7fDanY07x0HFfY2vhRTuJTYx5wTwrso:CyMxWTcWbOYhTTMYxuTc
Static task
static1
Behavioral task
behavioral1
Sample
df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dura
83.97.73.127:19062
-
auth_value
44b7d6fb9572dea0d64d018139c3d208
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba
-
Size
760KB
-
MD5
d3e12f0c7de252f808ff05faa781775f
-
SHA1
a607a9eb4deeb8b418077180663482ee7f5f5106
-
SHA256
df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba
-
SHA512
cdfa02fc77d1a15d6c0fa94595e48943d04a85f9c50402dcd5cc66f2b4b79c33dd0114cc660606c89c1ea1f2e4b4af8c42eea1993a4b59c017ee1d17dfa0705c
-
SSDEEP
12288:xMrfy90bUsN4BTt3qds7fDanY07x0HFfY2vhRTuJTYx5wTwrso:CyMxWTcWbOYhTTMYxuTc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-