General
-
Target
6ec9b536aaf678020e62034b21f4d0544f1b7d8c48dcf304417a5179543c7338
-
Size
754KB
-
Sample
230530-py4lcshh6w
-
MD5
3738fecce2c5e8bc21fbff5441a98c9e
-
SHA1
1b86c3c7daa8adc097bcebee0b3287a40b1c15e2
-
SHA256
6ec9b536aaf678020e62034b21f4d0544f1b7d8c48dcf304417a5179543c7338
-
SHA512
f6bc100ae53563d7ee7a73eab4478aadbadfda3e6ba15199bd04713ca6f86a1a70414e833b5b8a9a7c9ad2f18c3b22f9c2c82775ad144e97e8a756b21b051a6d
-
SSDEEP
12288:oMroy90VN1jXyHvrlMVgMjWJhDDIOk9Y9B3Ep7mQAVIAkTEpbhv2Q:AyajCPBMyMjWHXIOk9kO46AkTChvn
Static task
static1
Behavioral task
behavioral1
Sample
6ec9b536aaf678020e62034b21f4d0544f1b7d8c48dcf304417a5179543c7338.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
6ec9b536aaf678020e62034b21f4d0544f1b7d8c48dcf304417a5179543c7338
-
Size
754KB
-
MD5
3738fecce2c5e8bc21fbff5441a98c9e
-
SHA1
1b86c3c7daa8adc097bcebee0b3287a40b1c15e2
-
SHA256
6ec9b536aaf678020e62034b21f4d0544f1b7d8c48dcf304417a5179543c7338
-
SHA512
f6bc100ae53563d7ee7a73eab4478aadbadfda3e6ba15199bd04713ca6f86a1a70414e833b5b8a9a7c9ad2f18c3b22f9c2c82775ad144e97e8a756b21b051a6d
-
SSDEEP
12288:oMroy90VN1jXyHvrlMVgMjWJhDDIOk9Y9B3Ep7mQAVIAkTEpbhv2Q:AyajCPBMyMjWHXIOk9kO46AkTChvn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-