General
-
Target
f07dc709600a2688c7b1771c90a20cdc193075faed95e684195cf48276e8e6e1
-
Size
781KB
-
Sample
230528-q8va4sfc35
-
MD5
542d9c7303e281dc3abb8d96cffc02e4
-
SHA1
585e4a0e8cd4c616ee2e68e6910a660c6a05dc9a
-
SHA256
f07dc709600a2688c7b1771c90a20cdc193075faed95e684195cf48276e8e6e1
-
SHA512
4a0e08bf9abec06e886f165baeb5380b879f8979c39a88447ccd67f5963a7a82c0b2445e780c6020d839efe0912bcb39a1a8de1e21df7e14c430b7b224d6e940
-
SSDEEP
12288:LMr/y90rEjR4saWk1I3jmL3q24gOIuKtByYHXmGfUoBSO/D8ma0U:wy8E94sCZr/6KtooX/UoBX/DS
Static task
static1
Behavioral task
behavioral1
Sample
f07dc709600a2688c7b1771c90a20cdc193075faed95e684195cf48276e8e6e1.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
mirko
83.97.73.127:19062
-
auth_value
35111a095377107ec8b7d3e035831af8
Targets
-
-
Target
f07dc709600a2688c7b1771c90a20cdc193075faed95e684195cf48276e8e6e1
-
Size
781KB
-
MD5
542d9c7303e281dc3abb8d96cffc02e4
-
SHA1
585e4a0e8cd4c616ee2e68e6910a660c6a05dc9a
-
SHA256
f07dc709600a2688c7b1771c90a20cdc193075faed95e684195cf48276e8e6e1
-
SHA512
4a0e08bf9abec06e886f165baeb5380b879f8979c39a88447ccd67f5963a7a82c0b2445e780c6020d839efe0912bcb39a1a8de1e21df7e14c430b7b224d6e940
-
SSDEEP
12288:LMr/y90rEjR4saWk1I3jmL3q24gOIuKtByYHXmGfUoBSO/D8ma0U:wy8E94sCZr/6KtooX/UoBX/DS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-