General
-
Target
719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74
-
Size
1.1MB
-
Sample
230516-pwbgsshh2w
-
MD5
1c5c4fa02e886f815047a9b81e7f520b
-
SHA1
e1253f2c3c9ec225d1361649ec124d242ec87650
-
SHA256
719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74
-
SHA512
53adca73a4461bfe3dfa35e59f6dd1dd1951e065dc9250e62deb6d30861ddaa788a1bdb11d12c82cacf44535d80cb35afd6ab738f82fafdf97e01a37d4c6c35c
-
SSDEEP
24576:DyQ0Vj4T496kBnzIjM/hThHn/3vbsuDzACldi0uqqvwW5+hkxbLz6:WQ0x0Nk9IOfvzAGi0uJYWQhkd
Static task
static1
Behavioral task
behavioral1
Sample
719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dopon
185.161.248.75:4132
-
auth_value
8b75ad7ee23fb4d414b2c7174486600e
Extracted
redline
srala
185.161.248.75:4132
-
auth_value
c90de493c232a904fb467fa366785cb6
Targets
-
-
Target
719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74
-
Size
1.1MB
-
MD5
1c5c4fa02e886f815047a9b81e7f520b
-
SHA1
e1253f2c3c9ec225d1361649ec124d242ec87650
-
SHA256
719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74
-
SHA512
53adca73a4461bfe3dfa35e59f6dd1dd1951e065dc9250e62deb6d30861ddaa788a1bdb11d12c82cacf44535d80cb35afd6ab738f82fafdf97e01a37d4c6c35c
-
SSDEEP
24576:DyQ0Vj4T496kBnzIjM/hThHn/3vbsuDzACldi0uqqvwW5+hkxbLz6:WQ0x0Nk9IOfvzAGi0uJYWQhkd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-