General
-
Target
6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14
-
Size
780KB
-
Sample
230528-m6yc7seh74
-
MD5
a4e1dee06978c99c028f3031cb8290f6
-
SHA1
650f1e0a0e56ba4f54c3d74d33091584c447a0ac
-
SHA256
6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14
-
SHA512
dd74960f3bb19525cc3e971373445db5dba55792368b489e7c490c3a27507542c357181776426e2f59e06a023719d94320ed53ba558564f9f36f2e6945047f73
-
SSDEEP
12288:0MrOy90BRSlJxG8aIWatAgkdJirt24qfoIq2fRnrz32+PIFNGDy/:yyKSDc815ogrtnqf7BfRnrLDAFoDy/
Static task
static1
Behavioral task
behavioral1
Sample
6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daswa
83.97.73.127:19062
-
auth_value
a6ab6b8df5480a0bb295d3c069f67bf8
Extracted
redline
mirko
83.97.73.127:19062
-
auth_value
35111a095377107ec8b7d3e035831af8
Targets
-
-
Target
6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14
-
Size
780KB
-
MD5
a4e1dee06978c99c028f3031cb8290f6
-
SHA1
650f1e0a0e56ba4f54c3d74d33091584c447a0ac
-
SHA256
6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14
-
SHA512
dd74960f3bb19525cc3e971373445db5dba55792368b489e7c490c3a27507542c357181776426e2f59e06a023719d94320ed53ba558564f9f36f2e6945047f73
-
SSDEEP
12288:0MrOy90BRSlJxG8aIWatAgkdJirt24qfoIq2fRnrz32+PIFNGDy/:yyKSDc815ogrtnqf7BfRnrLDAFoDy/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-