General
-
Target
744df38d73a9d9936ef8c90557a5a88c355414bd80b032752512081149fdc88e
-
Size
804KB
-
Sample
230528-wz4q3sgf2y
-
MD5
20c0021cecc700350ae63395caf32d0b
-
SHA1
334fcf41cb2722cbf1e943b3f84da6b006fea7d5
-
SHA256
744df38d73a9d9936ef8c90557a5a88c355414bd80b032752512081149fdc88e
-
SHA512
59228c33e20a15e6c0e1c192bf9c127e9dc08adbbaf372f022e6112b60d3883b24182f342ea45ae67157085fa861cacc8d7fa5fbcb2828fb6186727c7576c95d
-
SSDEEP
24576:zyX8HfeeP8i5AzFWbKol16NrPOjWTLhNZFJ2mG35:GUmc8i5AzFAKolkrPOjWTLhNZFsz
Static task
static1
Behavioral task
behavioral1
Sample
744df38d73a9d9936ef8c90557a5a88c355414bd80b032752512081149fdc88e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
metro
83.97.73.127:19045
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
744df38d73a9d9936ef8c90557a5a88c355414bd80b032752512081149fdc88e
-
Size
804KB
-
MD5
20c0021cecc700350ae63395caf32d0b
-
SHA1
334fcf41cb2722cbf1e943b3f84da6b006fea7d5
-
SHA256
744df38d73a9d9936ef8c90557a5a88c355414bd80b032752512081149fdc88e
-
SHA512
59228c33e20a15e6c0e1c192bf9c127e9dc08adbbaf372f022e6112b60d3883b24182f342ea45ae67157085fa861cacc8d7fa5fbcb2828fb6186727c7576c95d
-
SSDEEP
24576:zyX8HfeeP8i5AzFWbKol16NrPOjWTLhNZFJ2mG35:GUmc8i5AzFAKolkrPOjWTLhNZFsz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-