General
-
Target
0242d84e4b1412d8829dc33f5d97bb6fb740ddf0f3a299c964fa2ff866cf1ed3.bin
-
Size
560KB
-
Sample
230511-w7behabd6x
-
MD5
20bfa89890d155d9dfd0850d1ef0bc4e
-
SHA1
3f9037eeb8b392068d3bc342f1f0e65e4c8be733
-
SHA256
0242d84e4b1412d8829dc33f5d97bb6fb740ddf0f3a299c964fa2ff866cf1ed3
-
SHA512
08f03e81daea5235bd9d8fc625ee5a97ac41396fa020ada8cdd9ff0e42ffa3f5be04bff6576f566a855f76600bacc1b540c33802cd8b338daaf08e99937eec88
-
SSDEEP
12288:QMrPy90SmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0Ng:PyIVd+kgPut0w5IeHKg
Static task
static1
Behavioral task
behavioral1
Sample
0242d84e4b1412d8829dc33f5d97bb6fb740ddf0f3a299c964fa2ff866cf1ed3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0242d84e4b1412d8829dc33f5d97bb6fb740ddf0f3a299c964fa2ff866cf1ed3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Targets
-
-
Target
0242d84e4b1412d8829dc33f5d97bb6fb740ddf0f3a299c964fa2ff866cf1ed3.bin
-
Size
560KB
-
MD5
20bfa89890d155d9dfd0850d1ef0bc4e
-
SHA1
3f9037eeb8b392068d3bc342f1f0e65e4c8be733
-
SHA256
0242d84e4b1412d8829dc33f5d97bb6fb740ddf0f3a299c964fa2ff866cf1ed3
-
SHA512
08f03e81daea5235bd9d8fc625ee5a97ac41396fa020ada8cdd9ff0e42ffa3f5be04bff6576f566a855f76600bacc1b540c33802cd8b338daaf08e99937eec88
-
SSDEEP
12288:QMrPy90SmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0Ng:PyIVd+kgPut0w5IeHKg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-