General
-
Target
75184d23f2274ec055b70fb9a78ad166
-
Size
876KB
-
Sample
240125-v2ez3abff4
-
MD5
75184d23f2274ec055b70fb9a78ad166
-
SHA1
d985714db286580a68de67f5717c8481b6490ea5
-
SHA256
dbff81f2bdd65f4f99e28fcdbbb4b410f5a12d9882b866b82082602899f610dc
-
SHA512
6897423ddc4c9b53d71547f75974030e58c56d908095186d469e1979fec27863749cc648dfbdf782a7a11c7d77cd5225f6ef5fa5d8967cdacd0db44dad263b89
-
SSDEEP
24576:nyLHuEU/Ve5SXJe8qXHgaKpr6gLUIpnK2ljS27vs:yLOgR3fgLPpyU
Static task
static1
Behavioral task
behavioral1
Sample
75184d23f2274ec055b70fb9a78ad166.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75184d23f2274ec055b70fb9a78ad166.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
redline
Build2_Mastif
95.181.157.69:8552
Targets
-
-
Target
75184d23f2274ec055b70fb9a78ad166
-
Size
876KB
-
MD5
75184d23f2274ec055b70fb9a78ad166
-
SHA1
d985714db286580a68de67f5717c8481b6490ea5
-
SHA256
dbff81f2bdd65f4f99e28fcdbbb4b410f5a12d9882b866b82082602899f610dc
-
SHA512
6897423ddc4c9b53d71547f75974030e58c56d908095186d469e1979fec27863749cc648dfbdf782a7a11c7d77cd5225f6ef5fa5d8967cdacd0db44dad263b89
-
SSDEEP
24576:nyLHuEU/Ve5SXJe8qXHgaKpr6gLUIpnK2ljS27vs:yLOgR3fgLPpyU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-