General
-
Target
ac2b480a0ea66203a7f88d3c3a9a38750acf549b8c11e632b87656318ea510fe
-
Size
1.1MB
-
Sample
230516-n4l3tsaf57
-
MD5
006e39787b679210694b4a72f4069ccf
-
SHA1
0113249da10366b34ffd4274d80a4fa5363b5ff9
-
SHA256
ac2b480a0ea66203a7f88d3c3a9a38750acf549b8c11e632b87656318ea510fe
-
SHA512
6fa1d13164d51cad2dc54d097c9f73aad695f2fac170f87cb13f0984d81efaf4f8143e8f560eb4d7d2bd2278693251f870d8a053524c9fc31cd184f5a9e665c4
-
SSDEEP
24576:CycWWKwzhfkxv922Tbptx768cktqTUZCupDmCdZaPeN61ecEBHJ:pcscavk0dH7LqTdoFOPeNiecEJ
Static task
static1
Behavioral task
behavioral1
Sample
ac2b480a0ea66203a7f88d3c3a9a38750acf549b8c11e632b87656318ea510fe.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
muxan
185.161.248.75:4132
-
auth_value
d605be949bb645b0759bf765eb7e6a47
Extracted
redline
srala
185.161.248.75:4132
-
auth_value
c90de493c232a904fb467fa366785cb6
Targets
-
-
Target
ac2b480a0ea66203a7f88d3c3a9a38750acf549b8c11e632b87656318ea510fe
-
Size
1.1MB
-
MD5
006e39787b679210694b4a72f4069ccf
-
SHA1
0113249da10366b34ffd4274d80a4fa5363b5ff9
-
SHA256
ac2b480a0ea66203a7f88d3c3a9a38750acf549b8c11e632b87656318ea510fe
-
SHA512
6fa1d13164d51cad2dc54d097c9f73aad695f2fac170f87cb13f0984d81efaf4f8143e8f560eb4d7d2bd2278693251f870d8a053524c9fc31cd184f5a9e665c4
-
SSDEEP
24576:CycWWKwzhfkxv922Tbptx768cktqTUZCupDmCdZaPeN61ecEBHJ:pcscavk0dH7LqTdoFOPeNiecEJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-