General
-
Target
dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31
-
Size
1.5MB
-
Sample
231004-m1636ach89
-
MD5
93c3b713ad6bfd5a05f0b50f9c23f335
-
SHA1
fa3fbbe74c03125a2201f797e03df28d6a26dbda
-
SHA256
eee76c8cc64059214efefbe5a50065cbc3a098ba56a5ae47d5290e5cd8fbda58
-
SHA512
b8fa28cd72a5b484b05caacec8fd895e141a457c121dd054e4f578400aacc28f293bf5ca154afc36c4f381bea7b3f6e4a76afb8056b8dc0576d67e39a6f4022a
-
SSDEEP
24576:93FyWessg3Ygrb0SNSRSPtieEhplS/mocE15hKoP6uQgbvK21vFu8Zfas2/23EaO:93gksg/v0vw1iFfGn6u7bvK21v48Zfa3
Static task
static1
Behavioral task
behavioral1
Sample
dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Targets
-
-
Target
dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31
-
Size
1.5MB
-
MD5
5f9e63419467b981b72d4f9adbe67d22
-
SHA1
420ec23d6870b000adc0eeeb60868a9cf7383e8f
-
SHA256
dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31
-
SHA512
1c633bd4f637d5eaa27c003b9565ef85a32009c40e2c33c2f6e01be35ecd3ce14520e3ac230c787fc39cbdf148b09b34f74b890c3f45593acee72a7c624c6140
-
SSDEEP
49152:1Ls/ZE3GjEnAXnG7fkG7NvK41vG8ZfEnf:da23GjEnAXtGQOOvf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1