General
-
Target
1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd
-
Size
752KB
-
Sample
230530-kvkxmagh7t
-
MD5
f84a420cebd36e0165e36e50bdbb9a34
-
SHA1
f71d0d3a91242309a65fe1d1faa372698874d138
-
SHA256
1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd
-
SHA512
bb7b2aa43226b45eaf06658d6832787fb94665556232e7b134a63847e75fde975418368276227bd78e9698f35a941a381af5019aa154a852d0b8b38355c51eef
-
SSDEEP
12288:yMrSy90zlkFtp+dxtyffqWftUf5n7OoPxvYlWn9Hcw0Ztl44ygHKP4W7:syU+FtpryWftgSGTn6wItpyUFo
Static task
static1
Behavioral task
behavioral1
Sample
1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
maxi
83.97.73.127:19045
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd
-
Size
752KB
-
MD5
f84a420cebd36e0165e36e50bdbb9a34
-
SHA1
f71d0d3a91242309a65fe1d1faa372698874d138
-
SHA256
1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd
-
SHA512
bb7b2aa43226b45eaf06658d6832787fb94665556232e7b134a63847e75fde975418368276227bd78e9698f35a941a381af5019aa154a852d0b8b38355c51eef
-
SSDEEP
12288:yMrSy90zlkFtp+dxtyffqWftUf5n7OoPxvYlWn9Hcw0Ztl44ygHKP4W7:syU+FtpryWftgSGTn6wItpyUFo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-