General
-
Target
91ee7f57e9509d5b74148c697d5b3872a0104ae8f1eaf12a0b93326b717adf79
-
Size
1.0MB
-
Sample
230517-emxcsscf9x
-
MD5
9a37e874345e3222099a6ed243d6e400
-
SHA1
bd98549d71807352c3285f5dae41b032963770a9
-
SHA256
91ee7f57e9509d5b74148c697d5b3872a0104ae8f1eaf12a0b93326b717adf79
-
SHA512
c3b644c4addcda916470a8ce581844b89315ebf0b562c12f1be653e39515f2863977703bc974ba02fd72e41b9d503cefd8b2aa7c6711d10e553a1b6ccfd86ecd
-
SSDEEP
12288:eMrXy90YTZnidqlvbUyMOxbKnSBbgaBGKMn8LOIvrnFkaA+QAEthT7xrCJgH8aqp:JyRTBls6bLBBxbA+QrhJrKisCxY
Static task
static1
Behavioral task
behavioral1
Sample
91ee7f57e9509d5b74148c697d5b3872a0104ae8f1eaf12a0b93326b717adf79.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
91ee7f57e9509d5b74148c697d5b3872a0104ae8f1eaf12a0b93326b717adf79.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dusor
185.161.248.25:4132
-
auth_value
b81217cf5a516122d407aeaf79d22948
Targets
-
-
Target
91ee7f57e9509d5b74148c697d5b3872a0104ae8f1eaf12a0b93326b717adf79
-
Size
1.0MB
-
MD5
9a37e874345e3222099a6ed243d6e400
-
SHA1
bd98549d71807352c3285f5dae41b032963770a9
-
SHA256
91ee7f57e9509d5b74148c697d5b3872a0104ae8f1eaf12a0b93326b717adf79
-
SHA512
c3b644c4addcda916470a8ce581844b89315ebf0b562c12f1be653e39515f2863977703bc974ba02fd72e41b9d503cefd8b2aa7c6711d10e553a1b6ccfd86ecd
-
SSDEEP
12288:eMrXy90YTZnidqlvbUyMOxbKnSBbgaBGKMn8LOIvrnFkaA+QAEthT7xrCJgH8aqp:JyRTBls6bLBBxbA+QrhJrKisCxY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-