General
-
Target
ab502302f59d5639f58d9bd1a0ce67f4972e3a6b7e94cbbde650c64a620f7b70
-
Size
1.0MB
-
Sample
230530-phg3eshe42
-
MD5
6516922506f737ec3bf9967d48809a84
-
SHA1
892f1a1f5261a335107e86c17880e61c47bed30d
-
SHA256
ab502302f59d5639f58d9bd1a0ce67f4972e3a6b7e94cbbde650c64a620f7b70
-
SHA512
c44a615a1c09a959fad97bfeba19c151b2c34fdd0bb81fd64c6a75382cee73e9d358dc9d5f81019b27995452496137062fd956e5fe09cba582e75d65577f509c
-
SSDEEP
24576:BykT/oUqjtEI8aGsmxAF/42BpqwB3v2IqX+GvhLeA/:0kT/oUsZ8aPmSnrB/AOGvhLeA
Static task
static1
Behavioral task
behavioral1
Sample
ab502302f59d5639f58d9bd1a0ce67f4972e3a6b7e94cbbde650c64a620f7b70.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lusa
83.97.73.127:19045
-
auth_value
c9df946711e01c378b42221de692acbd
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
ab502302f59d5639f58d9bd1a0ce67f4972e3a6b7e94cbbde650c64a620f7b70
-
Size
1.0MB
-
MD5
6516922506f737ec3bf9967d48809a84
-
SHA1
892f1a1f5261a335107e86c17880e61c47bed30d
-
SHA256
ab502302f59d5639f58d9bd1a0ce67f4972e3a6b7e94cbbde650c64a620f7b70
-
SHA512
c44a615a1c09a959fad97bfeba19c151b2c34fdd0bb81fd64c6a75382cee73e9d358dc9d5f81019b27995452496137062fd956e5fe09cba582e75d65577f509c
-
SSDEEP
24576:BykT/oUqjtEI8aGsmxAF/42BpqwB3v2IqX+GvhLeA/:0kT/oUsZ8aPmSnrB/AOGvhLeA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-