General
-
Target
6c6082929897c5a17e63ec1b7fdda8be715afc2c6ba90cef89d73a76b94db3e3
-
Size
771KB
-
Sample
230528-eqpgcseb38
-
MD5
75aae8fab93fca028a98b430f2642421
-
SHA1
eb30c4e27187a8c2e4f9cdd3092b359467b8dd8e
-
SHA256
6c6082929897c5a17e63ec1b7fdda8be715afc2c6ba90cef89d73a76b94db3e3
-
SHA512
6dd97d718c9142f0d9e862217581ef746761c29bb18749cda5b5f8f398f28dfeeba5d92dade06457e4fd6cbfc00374a61abfaf61e754f0df2b0921c1dc05b4a8
-
SSDEEP
12288:zMr7y90L3f72OCC4YsCjnyHHgUgwzoNR/cXAhWVgCToWbpSd1Eu:Ay2f7c2sCjnyngO8NR0qWNtSYu
Static task
static1
Behavioral task
behavioral1
Sample
6c6082929897c5a17e63ec1b7fdda8be715afc2c6ba90cef89d73a76b94db3e3.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mura
83.97.73.127:19062
-
auth_value
b2ee4a66a20fb9e998d6a68277565331
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
6c6082929897c5a17e63ec1b7fdda8be715afc2c6ba90cef89d73a76b94db3e3
-
Size
771KB
-
MD5
75aae8fab93fca028a98b430f2642421
-
SHA1
eb30c4e27187a8c2e4f9cdd3092b359467b8dd8e
-
SHA256
6c6082929897c5a17e63ec1b7fdda8be715afc2c6ba90cef89d73a76b94db3e3
-
SHA512
6dd97d718c9142f0d9e862217581ef746761c29bb18749cda5b5f8f398f28dfeeba5d92dade06457e4fd6cbfc00374a61abfaf61e754f0df2b0921c1dc05b4a8
-
SSDEEP
12288:zMr7y90L3f72OCC4YsCjnyHHgUgwzoNR/cXAhWVgCToWbpSd1Eu:Ay2f7c2sCjnyngO8NR0qWNtSYu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-