General
-
Target
551ef9fbe4b401d1f65a7690c14d0d19e16a0ae257d62aef2e1c3a4760018b89
-
Size
770KB
-
Sample
230528-gngd3seh2y
-
MD5
9cf4354e7baa4a1d2212f47e42cf03a9
-
SHA1
50975c7be277ec4ff484fd3e48f67c5f289233e6
-
SHA256
551ef9fbe4b401d1f65a7690c14d0d19e16a0ae257d62aef2e1c3a4760018b89
-
SHA512
9c03e26ba0c17386d171ef647ec1a11c26a35ba35c3e3aa05e55db4f78b63569bb030f7aea2d8b2c85a339d097469eb6762bc090fe47abbc0967ccc38aa4f456
-
SSDEEP
24576:tygx0U2wMq26i1AzALr3zGsEZ7VzWD9UZFx5limCv3:IMIPdvL7i3y8FLl/C
Static task
static1
Behavioral task
behavioral1
Sample
551ef9fbe4b401d1f65a7690c14d0d19e16a0ae257d62aef2e1c3a4760018b89.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dura
83.97.73.127:19062
-
auth_value
44b7d6fb9572dea0d64d018139c3d208
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
551ef9fbe4b401d1f65a7690c14d0d19e16a0ae257d62aef2e1c3a4760018b89
-
Size
770KB
-
MD5
9cf4354e7baa4a1d2212f47e42cf03a9
-
SHA1
50975c7be277ec4ff484fd3e48f67c5f289233e6
-
SHA256
551ef9fbe4b401d1f65a7690c14d0d19e16a0ae257d62aef2e1c3a4760018b89
-
SHA512
9c03e26ba0c17386d171ef647ec1a11c26a35ba35c3e3aa05e55db4f78b63569bb030f7aea2d8b2c85a339d097469eb6762bc090fe47abbc0967ccc38aa4f456
-
SSDEEP
24576:tygx0U2wMq26i1AzALr3zGsEZ7VzWD9UZFx5limCv3:IMIPdvL7i3y8FLl/C
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-