General
-
Target
49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c
-
Size
770KB
-
Sample
230511-ed98asdd8x
-
MD5
1367dd99e9638a11468451a5b7c0c3da
-
SHA1
448a9f7f72af2821dca94daabd5b74aa445c6b91
-
SHA256
49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c
-
SHA512
4dc21809b321975bc28f3defa27015f584a929b1df98241a93f0fd4e6867aa3b9f35d82fed379c44828cacfb8859484e6bf8c2ddaf097e445d4849dffc621909
-
SSDEEP
24576:xytIeJKcKL3+vSG7aXGuzUsiRXepHoWYuG:k2eyKSOaXLMKHoW
Static task
static1
Behavioral task
behavioral1
Sample
49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
debro
185.161.248.75:4132
-
auth_value
18c2c191aebfde5d1787ec8d805a01a8
Targets
-
-
Target
49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c
-
Size
770KB
-
MD5
1367dd99e9638a11468451a5b7c0c3da
-
SHA1
448a9f7f72af2821dca94daabd5b74aa445c6b91
-
SHA256
49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c
-
SHA512
4dc21809b321975bc28f3defa27015f584a929b1df98241a93f0fd4e6867aa3b9f35d82fed379c44828cacfb8859484e6bf8c2ddaf097e445d4849dffc621909
-
SSDEEP
24576:xytIeJKcKL3+vSG7aXGuzUsiRXepHoWYuG:k2eyKSOaXLMKHoW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-