General
-
Target
6a9b96747c2b7d53c5c673cd1b636634c7b30616c42698803b5b1e87965c2a95
-
Size
751KB
-
Sample
230530-zjj9aaca5w
-
MD5
edceba2de19a8a54d9beb9e5492795a1
-
SHA1
8efeb48511560cdd1456166464e256d0cfc7ba33
-
SHA256
6a9b96747c2b7d53c5c673cd1b636634c7b30616c42698803b5b1e87965c2a95
-
SHA512
9ca3dedaca9b65b9bcee2891d74feef85eac4d2f594573102a8e412a3a061e27928e559a1eadbc8c9e30c05a865ef3c53010dc4e3ae22d365cf1952e767b9b92
-
SSDEEP
12288:xMr7y90FDNATgWWhiB/ijXjPpm0iEYdefYMHZ00F4oCbdOOeHSedjRmCL1CVpUr:SyOjDjXj0def5F4/xeyq84
Static task
static1
Behavioral task
behavioral1
Sample
6a9b96747c2b7d53c5c673cd1b636634c7b30616c42698803b5b1e87965c2a95.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
6a9b96747c2b7d53c5c673cd1b636634c7b30616c42698803b5b1e87965c2a95
-
Size
751KB
-
MD5
edceba2de19a8a54d9beb9e5492795a1
-
SHA1
8efeb48511560cdd1456166464e256d0cfc7ba33
-
SHA256
6a9b96747c2b7d53c5c673cd1b636634c7b30616c42698803b5b1e87965c2a95
-
SHA512
9ca3dedaca9b65b9bcee2891d74feef85eac4d2f594573102a8e412a3a061e27928e559a1eadbc8c9e30c05a865ef3c53010dc4e3ae22d365cf1952e767b9b92
-
SSDEEP
12288:xMr7y90FDNATgWWhiB/ijXjPpm0iEYdefYMHZ00F4oCbdOOeHSedjRmCL1CVpUr:SyOjDjXj0def5F4/xeyq84
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-