General
-
Target
6a6418c12aa8be6513d5b2277765c4f9fcc859b714a7346080151af5a77a77b1
-
Size
1.1MB
-
Sample
230516-r7v2paad21
-
MD5
92d611d964e5ae48ef653cc322bec10e
-
SHA1
d3ed042a2dda0571fc8a833947cd71643e4d1f6b
-
SHA256
6a6418c12aa8be6513d5b2277765c4f9fcc859b714a7346080151af5a77a77b1
-
SHA512
d64217fb391ea1f1f4459045141bec20fce3e88674520a91df0218f46d4c4ad514a21ad58da0cfd981387922e22be2519fd730bdc4987e5b2bcb1341bb7cc60d
-
SSDEEP
24576:Iy3KS7NqLRRfGLP3XCfFo1bYd9Ldxq/BcXst7rdDHj:P3KSZgPA3yfFoY9LqZTdD
Static task
static1
Behavioral task
behavioral1
Sample
6a6418c12aa8be6513d5b2277765c4f9fcc859b714a7346080151af5a77a77b1.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
muxan
185.161.248.75:4132
-
auth_value
d605be949bb645b0759bf765eb7e6a47
Extracted
redline
srala
185.161.248.75:4132
-
auth_value
c90de493c232a904fb467fa366785cb6
Targets
-
-
Target
6a6418c12aa8be6513d5b2277765c4f9fcc859b714a7346080151af5a77a77b1
-
Size
1.1MB
-
MD5
92d611d964e5ae48ef653cc322bec10e
-
SHA1
d3ed042a2dda0571fc8a833947cd71643e4d1f6b
-
SHA256
6a6418c12aa8be6513d5b2277765c4f9fcc859b714a7346080151af5a77a77b1
-
SHA512
d64217fb391ea1f1f4459045141bec20fce3e88674520a91df0218f46d4c4ad514a21ad58da0cfd981387922e22be2519fd730bdc4987e5b2bcb1341bb7cc60d
-
SSDEEP
24576:Iy3KS7NqLRRfGLP3XCfFo1bYd9Ldxq/BcXst7rdDHj:P3KSZgPA3yfFoY9LqZTdD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-