General
-
Target
3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5
-
Size
781KB
-
Sample
230528-n362lsfa62
-
MD5
adce23fcc0df4d8575bc3b4e0bdaecdd
-
SHA1
a9f5427ead40aa75a7bad13d956caa45c8bdc16c
-
SHA256
3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5
-
SHA512
4a8dc6183c8422ff4234f9782cf17b4449e6cae43183c7987ad48cd454cf04a5963627d70709b73540776314a33d14d2e8206189d139e59cf45fbb7c91627b6a
-
SSDEEP
12288:mMrxy90901kzsDHty/zNpl6OwY+eh2FCHssQXjsq3V1yEdygMC/Yb:Py+01ltyLzlyYRYFKn01yHgMYo
Static task
static1
Behavioral task
behavioral1
Sample
3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daswa
83.97.73.127:19062
-
auth_value
a6ab6b8df5480a0bb295d3c069f67bf8
Extracted
redline
mirko
83.97.73.127:19062
-
auth_value
35111a095377107ec8b7d3e035831af8
Targets
-
-
Target
3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5
-
Size
781KB
-
MD5
adce23fcc0df4d8575bc3b4e0bdaecdd
-
SHA1
a9f5427ead40aa75a7bad13d956caa45c8bdc16c
-
SHA256
3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5
-
SHA512
4a8dc6183c8422ff4234f9782cf17b4449e6cae43183c7987ad48cd454cf04a5963627d70709b73540776314a33d14d2e8206189d139e59cf45fbb7c91627b6a
-
SSDEEP
12288:mMrxy90901kzsDHty/zNpl6OwY+eh2FCHssQXjsq3V1yEdygMC/Yb:Py+01ltyLzlyYRYFKn01yHgMYo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-