General
-
Target
6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c
-
Size
751KB
-
Sample
230530-za474aca2x
-
MD5
7c1cf61b4977fd40d8c2ec8b21a1af71
-
SHA1
f2c2571493d0bda38fff462c597b5eb236a2d331
-
SHA256
6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c
-
SHA512
fdff574f6d7f40e18940f7130427ec72dd3fa7a1b4145ee714d7da013feb3b2d8fccc2b4f148aa558828e48a9188a57a3b9d5cd674eff02197dde4d435efcc65
-
SSDEEP
12288:6Mrpy90krNBbKaU0bPJ+P9drESq6p4yEFUQRaRDoGAqqmsweuoWyZumCd72YNUBq:7yZ3NoP9OJ6iZRa5A8KuaZda2YNq8bR
Static task
static1
Behavioral task
behavioral1
Sample
6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c
-
Size
751KB
-
MD5
7c1cf61b4977fd40d8c2ec8b21a1af71
-
SHA1
f2c2571493d0bda38fff462c597b5eb236a2d331
-
SHA256
6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c
-
SHA512
fdff574f6d7f40e18940f7130427ec72dd3fa7a1b4145ee714d7da013feb3b2d8fccc2b4f148aa558828e48a9188a57a3b9d5cd674eff02197dde4d435efcc65
-
SSDEEP
12288:6Mrpy90krNBbKaU0bPJ+P9drESq6p4yEFUQRaRDoGAqqmsweuoWyZumCd72YNUBq:7yZ3NoP9OJ6iZRa5A8KuaZda2YNq8bR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-