General
-
Target
db32a481ffba3fe529ed4fbf79d5a0586d9ac83bb78434998ece1b14a71d6a11
-
Size
752KB
-
Sample
230530-1fgvescb5x
-
MD5
c33e51c683952797961a2d92f4861a34
-
SHA1
65150fcd2e4f8b19d0a494df2559e7d1b86e6d34
-
SHA256
db32a481ffba3fe529ed4fbf79d5a0586d9ac83bb78434998ece1b14a71d6a11
-
SHA512
2c1895696dad039f20d3f97da29822ee626209c335554b9dd3dc866001298cb45e0b1ddce07eddfe98adedbf1b3a493991ec152fdc8f40900ac6f17223a70386
-
SSDEEP
12288:EMrsy903ro/oRJBjHZUwmK3QzDylBD1pYlKiZ+YMrI+BwFH+iMlxW5:gyGcm5HOwl3Qi9OlKiZbMrIewFH+JI5
Static task
static1
Behavioral task
behavioral1
Sample
db32a481ffba3fe529ed4fbf79d5a0586d9ac83bb78434998ece1b14a71d6a11.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
db32a481ffba3fe529ed4fbf79d5a0586d9ac83bb78434998ece1b14a71d6a11
-
Size
752KB
-
MD5
c33e51c683952797961a2d92f4861a34
-
SHA1
65150fcd2e4f8b19d0a494df2559e7d1b86e6d34
-
SHA256
db32a481ffba3fe529ed4fbf79d5a0586d9ac83bb78434998ece1b14a71d6a11
-
SHA512
2c1895696dad039f20d3f97da29822ee626209c335554b9dd3dc866001298cb45e0b1ddce07eddfe98adedbf1b3a493991ec152fdc8f40900ac6f17223a70386
-
SSDEEP
12288:EMrsy903ro/oRJBjHZUwmK3QzDylBD1pYlKiZ+YMrI+BwFH+iMlxW5:gyGcm5HOwl3Qi9OlKiZbMrIewFH+JI5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-