General
-
Target
2cc1241dd44a740727c2d9eef8ef13374fedebbc40744cb0ac3e5590ff9d4a9d
-
Size
752KB
-
Sample
230530-xsflcabc48
-
MD5
f91c126a65aa9389084cf7662a4e2713
-
SHA1
95f7d2a7c102ce8f1657ac1907b0424af3291f9b
-
SHA256
2cc1241dd44a740727c2d9eef8ef13374fedebbc40744cb0ac3e5590ff9d4a9d
-
SHA512
c42b3d3ee75bb1c7141cb41492bc9d130ea669bc38a11b92e0b0e275da01f294cf0d82932773235971acf92eb1df2b9ace6cbb21b9b58df72ef45937199637d3
-
SSDEEP
12288:TMr7y90+/gh+uOYZaN3IRG4zv/bhNYpDZKE9/aFSMzGKy6mp4SL0+g4X98:4yX4hfRaN3IRLjFKpDFaFSMzty6Klg4q
Static task
static1
Behavioral task
behavioral1
Sample
2cc1241dd44a740727c2d9eef8ef13374fedebbc40744cb0ac3e5590ff9d4a9d.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
musa
83.97.73.127:19045
-
auth_value
745cd242a52ab79c9c9026155d62f359
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
2cc1241dd44a740727c2d9eef8ef13374fedebbc40744cb0ac3e5590ff9d4a9d
-
Size
752KB
-
MD5
f91c126a65aa9389084cf7662a4e2713
-
SHA1
95f7d2a7c102ce8f1657ac1907b0424af3291f9b
-
SHA256
2cc1241dd44a740727c2d9eef8ef13374fedebbc40744cb0ac3e5590ff9d4a9d
-
SHA512
c42b3d3ee75bb1c7141cb41492bc9d130ea669bc38a11b92e0b0e275da01f294cf0d82932773235971acf92eb1df2b9ace6cbb21b9b58df72ef45937199637d3
-
SSDEEP
12288:TMr7y90+/gh+uOYZaN3IRG4zv/bhNYpDZKE9/aFSMzGKy6mp4SL0+g4X98:4yX4hfRaN3IRLjFKpDFaFSMzty6Klg4q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-