General
-
Target
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe
-
Size
866KB
-
Sample
231001-y7at3sfa36
-
MD5
eeacddb883c73f4e22781b88dbfb5b3b
-
SHA1
a5d7426e70b412785d331fc96273ea4b1d987cc3
-
SHA256
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9
-
SHA512
753a4758d6da1ab7188b70356c4decaa39344f6cd33b533b5d11c7e4ef564ec211f60ca94130f87fbfeaeea4db303cda4c90a8865ae6d1d1b67050e95b9a70fb
-
SSDEEP
12288:YMrIy90jM4BLFyCmkb+iePQUprgyb+mfT/myMJdhSiG4gJgQLUmUPkerkxiexhik:gywMA4Cx2YUprfRfTOxDxQL/2kxieF5
Static task
static1
Behavioral task
behavioral1
Sample
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Targets
-
-
Target
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe
-
Size
866KB
-
MD5
eeacddb883c73f4e22781b88dbfb5b3b
-
SHA1
a5d7426e70b412785d331fc96273ea4b1d987cc3
-
SHA256
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9
-
SHA512
753a4758d6da1ab7188b70356c4decaa39344f6cd33b533b5d11c7e4ef564ec211f60ca94130f87fbfeaeea4db303cda4c90a8865ae6d1d1b67050e95b9a70fb
-
SSDEEP
12288:YMrIy90jM4BLFyCmkb+iePQUprgyb+mfT/myMJdhSiG4gJgQLUmUPkerkxiexhik:gywMA4Cx2YUprfRfTOxDxQL/2kxieF5
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-