General
-
Target
dff8a0ed2f8dc6edd1b27a36512f49cbf4458570a30024a8e1928da1012711c1
-
Size
754KB
-
Sample
230530-nevzfahe8x
-
MD5
1f4c2dd4d8b61ed7958e385d46896c78
-
SHA1
cba86fd2ec251b7267131846c138c6274ecb680e
-
SHA256
dff8a0ed2f8dc6edd1b27a36512f49cbf4458570a30024a8e1928da1012711c1
-
SHA512
9f9cf8f8eb54db370595e0a86a87056400993f76e2cc187eb4e60301d7216e60ce9ea88feee178a9581a929413477ddf27d5b6b4ee7eb8eddc733b6e3c376660
-
SSDEEP
12288:cMr+y90vePWRpIKmkRTNQRK1CrapRLRAtqCEzgcJCgvcK4FoU+J5arAwt4Iz:ayLWRtmk7Q41tRGta0cJHvPzzC4+
Static task
static1
Behavioral task
behavioral1
Sample
dff8a0ed2f8dc6edd1b27a36512f49cbf4458570a30024a8e1928da1012711c1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.127:19045
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
dff8a0ed2f8dc6edd1b27a36512f49cbf4458570a30024a8e1928da1012711c1
-
Size
754KB
-
MD5
1f4c2dd4d8b61ed7958e385d46896c78
-
SHA1
cba86fd2ec251b7267131846c138c6274ecb680e
-
SHA256
dff8a0ed2f8dc6edd1b27a36512f49cbf4458570a30024a8e1928da1012711c1
-
SHA512
9f9cf8f8eb54db370595e0a86a87056400993f76e2cc187eb4e60301d7216e60ce9ea88feee178a9581a929413477ddf27d5b6b4ee7eb8eddc733b6e3c376660
-
SSDEEP
12288:cMr+y90vePWRpIKmkRTNQRK1CrapRLRAtqCEzgcJCgvcK4FoU+J5arAwt4Iz:ayLWRtmk7Q41tRGta0cJHvPzzC4+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-