General
-
Target
bc94bbe6a23cc5f89cd1effb32b60588eeb051d7b71bea6d98850d445d733efd
-
Size
770KB
-
Sample
230528-nfzzsafa24
-
MD5
82bae7fba1d9cd83725e419a8c3f6823
-
SHA1
5ff6caa7c11fcb60454821390eb6b6978d860a70
-
SHA256
bc94bbe6a23cc5f89cd1effb32b60588eeb051d7b71bea6d98850d445d733efd
-
SHA512
3f229a1589664b727601b584295f5dc877bacc7e0c58d70d6cc27b30cd423d179d1e535e9766eba9fd13a06cbece654af47bfb89d62348b0d4490f2312af9840
-
SSDEEP
12288:XMroy90HGlDnq6upRebfuayc0jQxkdAPTVxdMtTEYPFZUXsQ5FWXgDc+u:3yvDq6upReqayclkePZx+t4YPsp5weA
Static task
static1
Behavioral task
behavioral1
Sample
bc94bbe6a23cc5f89cd1effb32b60588eeb051d7b71bea6d98850d445d733efd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mawa
83.97.73.127:19062
-
auth_value
c74d280ca4e3a15ff6b2af6fe2eb955b
Extracted
redline
mirko
83.97.73.127:19062
-
auth_value
35111a095377107ec8b7d3e035831af8
Targets
-
-
Target
bc94bbe6a23cc5f89cd1effb32b60588eeb051d7b71bea6d98850d445d733efd
-
Size
770KB
-
MD5
82bae7fba1d9cd83725e419a8c3f6823
-
SHA1
5ff6caa7c11fcb60454821390eb6b6978d860a70
-
SHA256
bc94bbe6a23cc5f89cd1effb32b60588eeb051d7b71bea6d98850d445d733efd
-
SHA512
3f229a1589664b727601b584295f5dc877bacc7e0c58d70d6cc27b30cd423d179d1e535e9766eba9fd13a06cbece654af47bfb89d62348b0d4490f2312af9840
-
SSDEEP
12288:XMroy90HGlDnq6upRebfuayc0jQxkdAPTVxdMtTEYPFZUXsQ5FWXgDc+u:3yvDq6upReqayclkePZx+t4YPsp5weA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-