General
-
Target
de3356743e7cdf1febb1e7f54fce3a34e942c240a60238a5305b0d60b4c5b9c0
-
Size
761KB
-
Sample
230527-txp4ssch3t
-
MD5
c848e54b676e015d2bfc26bc7b245357
-
SHA1
381ab30d063102fbddf3ab2eaf6a10836aea36eb
-
SHA256
de3356743e7cdf1febb1e7f54fce3a34e942c240a60238a5305b0d60b4c5b9c0
-
SHA512
41d5a6a138c2a45a9e5e8032b16b4c0fe5d96ba3e2c288fdd79a89eb83fdccb3afec07287a0d5179c1be65cd96d05ea2b5e17c8581f97b2dd97ed30edada4445
-
SSDEEP
12288:9Mr2y90FjUqelaTp4FeiEOgskd/ZNTqfOkpK8nryZMPdQihE0z4AuoL4:fyxaTGLpk7N2ISrfhEMFuoU
Static task
static1
Behavioral task
behavioral1
Sample
de3356743e7cdf1febb1e7f54fce3a34e942c240a60238a5305b0d60b4c5b9c0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dura
83.97.73.127:19062
-
auth_value
44b7d6fb9572dea0d64d018139c3d208
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
de3356743e7cdf1febb1e7f54fce3a34e942c240a60238a5305b0d60b4c5b9c0
-
Size
761KB
-
MD5
c848e54b676e015d2bfc26bc7b245357
-
SHA1
381ab30d063102fbddf3ab2eaf6a10836aea36eb
-
SHA256
de3356743e7cdf1febb1e7f54fce3a34e942c240a60238a5305b0d60b4c5b9c0
-
SHA512
41d5a6a138c2a45a9e5e8032b16b4c0fe5d96ba3e2c288fdd79a89eb83fdccb3afec07287a0d5179c1be65cd96d05ea2b5e17c8581f97b2dd97ed30edada4445
-
SSDEEP
12288:9Mr2y90FjUqelaTp4FeiEOgskd/ZNTqfOkpK8nryZMPdQihE0z4AuoL4:fyxaTGLpk7N2ISrfhEMFuoU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-