General
-
Target
9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1
-
Size
780KB
-
Sample
230528-qtnj1sff4z
-
MD5
9b2f5f7f5083c2f017ff1d812e3f183f
-
SHA1
ea5841fff457e6aba09ee23201b2c5460605dbd9
-
SHA256
9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1
-
SHA512
1a929d5e9055d5970238a20840369e4bfe38ec597ca30f18ab1fa0a02382f0b183b3c07e7c7f03cd3eef8a3a05473cb787e5a8ccb82b4bcab9eaff976f43a4df
-
SSDEEP
12288:DMrAy90ZWjnH8tn5upeDtTDF66sXZNh1wLb50wtgEkkh8OX2xvalc2NdJQjubeeE:vyDj0n5upeRH4XDh1wR0DkSDWFNhab
Static task
static1
Behavioral task
behavioral1
Sample
9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
daswa
83.97.73.127:19062
-
auth_value
a6ab6b8df5480a0bb295d3c069f67bf8
Extracted
redline
mirko
83.97.73.127:19062
-
auth_value
35111a095377107ec8b7d3e035831af8
Targets
-
-
Target
9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1
-
Size
780KB
-
MD5
9b2f5f7f5083c2f017ff1d812e3f183f
-
SHA1
ea5841fff457e6aba09ee23201b2c5460605dbd9
-
SHA256
9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1
-
SHA512
1a929d5e9055d5970238a20840369e4bfe38ec597ca30f18ab1fa0a02382f0b183b3c07e7c7f03cd3eef8a3a05473cb787e5a8ccb82b4bcab9eaff976f43a4df
-
SSDEEP
12288:DMrAy90ZWjnH8tn5upeDtTDF66sXZNh1wLb50wtgEkkh8OX2xvalc2NdJQjubeeE:vyDj0n5upeRH4XDh1wR0DkSDWFNhab
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-