General
-
Target
cfe9c910ac012c47badea5b528be5ceb57ffac0d0b98f85450629e9a218c515c
-
Size
752KB
-
Sample
230530-m93gbshe6x
-
MD5
e371fdd54e5288eeae41fedfb499d37f
-
SHA1
88e7319aac86c59be3f1d5886d2fb08796621b73
-
SHA256
cfe9c910ac012c47badea5b528be5ceb57ffac0d0b98f85450629e9a218c515c
-
SHA512
6073efdc7e5377b1ac3914666f807dbf12a04831523a32724fb932a23d96b8989cde624936084bc0cc5c61ca1d33e78eed56eeec27612f74aa1c1bf28b05c985
-
SSDEEP
12288:cMrly90C+1+r1Z5P4HtZj71CsKvR+aMOz6C5cPejqVY1lgAIwfqFEdon2Tls4f1i:pya+KH7jRCR83Oz6C0VY1lrIwyFEG2TW
Static task
static1
Behavioral task
behavioral1
Sample
cfe9c910ac012c47badea5b528be5ceb57ffac0d0b98f85450629e9a218c515c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
cfe9c910ac012c47badea5b528be5ceb57ffac0d0b98f85450629e9a218c515c
-
Size
752KB
-
MD5
e371fdd54e5288eeae41fedfb499d37f
-
SHA1
88e7319aac86c59be3f1d5886d2fb08796621b73
-
SHA256
cfe9c910ac012c47badea5b528be5ceb57ffac0d0b98f85450629e9a218c515c
-
SHA512
6073efdc7e5377b1ac3914666f807dbf12a04831523a32724fb932a23d96b8989cde624936084bc0cc5c61ca1d33e78eed56eeec27612f74aa1c1bf28b05c985
-
SSDEEP
12288:cMrly90C+1+r1Z5P4HtZj71CsKvR+aMOz6C5cPejqVY1lgAIwfqFEdon2Tls4f1i:pya+KH7jRCR83Oz6C0VY1lrIwyFEG2TW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-