General
-
Target
2d60782127cc40e315fabf6aed752e54.bin
-
Size
742KB
-
Sample
230605-mqdc4age3z
-
MD5
b096e6bad57bd9161bbb9577d6a98418
-
SHA1
4211645dc7b43193313dcf9c39cd199195651239
-
SHA256
fe1a9d8bfb9c45b323049d1b1b31369088a7e12eb87fa8f7689a0b77f49df359
-
SHA512
6b235c43c8ee407eac8414c5397a4e68e700a4696520d244fa3c4a9d7da1c6f9a7cbce0c4a9a77128a07b6437221949da9e5771c3e6e87542f18313b2a043310
-
SSDEEP
12288:k53rWqtzxojhtgTmUWRsJLLesf08r5+DtSXodAAUJZ6NwXiH0qvagCUdbQGHs3UZ:k5aaWtgQRWLesf0RD+bf6keXQGD/x
Static task
static1
Behavioral task
behavioral1
Sample
e3bfd095dde915136422887e63f1fc3b5bde09f587ca98c9f6a00b06fc6e6256.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e3bfd095dde915136422887e63f1fc3b5bde09f587ca98c9f6a00b06fc6e6256.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
metro
83.97.73.126:19046
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Targets
-
-
Target
e3bfd095dde915136422887e63f1fc3b5bde09f587ca98c9f6a00b06fc6e6256.exe
-
Size
785KB
-
MD5
2d60782127cc40e315fabf6aed752e54
-
SHA1
efc59aab76da9b309da2bc90810d059931d792b7
-
SHA256
e3bfd095dde915136422887e63f1fc3b5bde09f587ca98c9f6a00b06fc6e6256
-
SHA512
5a5955637f963d1626de25bad111c0b870d25ed23086dab1add8cc8de617e5783807a8ee3a57498e3c59c80a74f8c8cd3a2a716a0608953d04c0363019ddebbd
-
SSDEEP
12288:TMr6y90kAmwwtvaEEOBRYMR1YmCxcFO83lF4ommNI9rvqnYoNwRu0kWODSnj3Km2:dyNgODnYwU8r1mYI4ndwFkWjnmJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-