General
-
Target
1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59
-
Size
751KB
-
Sample
230530-ltwheahb6v
-
MD5
219be49b8ccafd9ef0bd25da674c3680
-
SHA1
a0faa3bbd7ca66095998227dc17ee735b0e21d2e
-
SHA256
1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59
-
SHA512
a769bc2cc7b82f46330457902f6c6cb4ceb4852cdc0a91190858b2d97fb2a010ef5c18df84b98e5b5c5ec7d87569d02757d79ee3109ea3331e9d02877efb6699
-
SSDEEP
12288:UMrsy90IxhkE+JW0a+5hwqgFe2/cgTM/CwAvIZ2Ds2Kz9lfHsYG874c2P/8:gy6DP+/czClY+/OHHst02P/8
Static task
static1
Behavioral task
behavioral1
Sample
1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59
-
Size
751KB
-
MD5
219be49b8ccafd9ef0bd25da674c3680
-
SHA1
a0faa3bbd7ca66095998227dc17ee735b0e21d2e
-
SHA256
1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59
-
SHA512
a769bc2cc7b82f46330457902f6c6cb4ceb4852cdc0a91190858b2d97fb2a010ef5c18df84b98e5b5c5ec7d87569d02757d79ee3109ea3331e9d02877efb6699
-
SSDEEP
12288:UMrsy90IxhkE+JW0a+5hwqgFe2/cgTM/CwAvIZ2Ds2Kz9lfHsYG874c2P/8:gy6DP+/czClY+/OHHst02P/8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-