General
-
Target
a405da84a2579767d0ad4e3eaaf2db09239eedbf77f54008c7c1d5a0807285b3
-
Size
770KB
-
Sample
230527-y5xaasde4t
-
MD5
0bdda803a08e4e4e640663e2b2318294
-
SHA1
644d094e9aba9bbc1b763271fe6d9c3b7eab820b
-
SHA256
a405da84a2579767d0ad4e3eaaf2db09239eedbf77f54008c7c1d5a0807285b3
-
SHA512
227426bc26dd427d0cb8cfcbbd83f22130e7d3cda31ebdb6d1bb6a15c6145243c3163efc280280b24406ec8a433a03045b55af7092713c230bd22c7664c6e83e
-
SSDEEP
12288:iMrGy90Jcp682wB4RZmXtC4VSK5g6bQA4J5+xE8SEb9ccW+YOSswXodJWyYVzF7l:wyWg2wzXYVCbY3+W8SxkIyGxCg
Static task
static1
Behavioral task
behavioral1
Sample
a405da84a2579767d0ad4e3eaaf2db09239eedbf77f54008c7c1d5a0807285b3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dura
83.97.73.127:19062
-
auth_value
44b7d6fb9572dea0d64d018139c3d208
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
a405da84a2579767d0ad4e3eaaf2db09239eedbf77f54008c7c1d5a0807285b3
-
Size
770KB
-
MD5
0bdda803a08e4e4e640663e2b2318294
-
SHA1
644d094e9aba9bbc1b763271fe6d9c3b7eab820b
-
SHA256
a405da84a2579767d0ad4e3eaaf2db09239eedbf77f54008c7c1d5a0807285b3
-
SHA512
227426bc26dd427d0cb8cfcbbd83f22130e7d3cda31ebdb6d1bb6a15c6145243c3163efc280280b24406ec8a433a03045b55af7092713c230bd22c7664c6e83e
-
SSDEEP
12288:iMrGy90Jcp682wB4RZmXtC4VSK5g6bQA4J5+xE8SEb9ccW+YOSswXodJWyYVzF7l:wyWg2wzXYVCbY3+W8SxkIyGxCg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-