General
-
Target
4f0e72634dfd99a740b58abd32c14e3a.bin
-
Size
720KB
-
Sample
230528-bttzgadg59
-
MD5
a869797bf5f654628923e9753618eea7
-
SHA1
7172911bfc2308426874e0ec13a86663e6672eb6
-
SHA256
02e4bcfa17e67af1cc0b5593b5b13a38cc77e5244c7d71342a0fe9a85790b812
-
SHA512
c91e77f9c5339cdc2d87dee1fd36daa6a1b8ab61cb7bb3833c0c34453c3d2178b7a12146011328c9e8748b955ed67145170fff12f4a1d69ed8d4c526a89cca2a
-
SSDEEP
12288:ILMAg4lx4+oGy8k2xiz3iTq30wMCs6XUl19jV5wM6tWpW5sNH+HZ:UE4y85iz98UUl19jdpW+AHZ
Static task
static1
Behavioral task
behavioral1
Sample
ceb40509077eb9c6bdf487bf8d7fbe703e6410361a30fffc100d7311f6d50d56.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ceb40509077eb9c6bdf487bf8d7fbe703e6410361a30fffc100d7311f6d50d56.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
misa
83.97.73.122:19062
-
auth_value
9e79529a6bdb4962f44d12b0d6d62d32
Extracted
redline
goga
83.97.73.122:19062
-
auth_value
6d57dff6d3c42dddb8a76dc276b8467f
Targets
-
-
Target
ceb40509077eb9c6bdf487bf8d7fbe703e6410361a30fffc100d7311f6d50d56.exe
-
Size
764KB
-
MD5
4f0e72634dfd99a740b58abd32c14e3a
-
SHA1
9f668bd7549ba16c89e864108c001b68094464f1
-
SHA256
ceb40509077eb9c6bdf487bf8d7fbe703e6410361a30fffc100d7311f6d50d56
-
SHA512
7f89816a53d020de0c589e457c5a027a895998068b28b677f0cc63a30f68bd65222e70d48cd04afa622e0010fd4279889f7730c7059d85e98a371f1709c999ef
-
SSDEEP
12288:jMrpy90twAkE/LdS/7xKeTmHxL6XAUmfnrdhf4xPC4II4dqOmdQLBBEQ/+:CyekETdS/FZyWAlP3f4d94kOmdU9+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-