General
-
Target
54a7511be551de1a5ea821ed676cbdbf05fc0889a870c07077a4c3fa60565f39
-
Size
1.0MB
-
Sample
230518-q45laaaf81
-
MD5
8c45ad8fe87e67822daf4bcdec93ea50
-
SHA1
57d76207373dd279dcf0d702330bff2911e5f06f
-
SHA256
54a7511be551de1a5ea821ed676cbdbf05fc0889a870c07077a4c3fa60565f39
-
SHA512
238b4a5cfbd07718286b13a2e04bef65503d0079f0fe24121db972a8a73bd8737cda96bca62829cb468f5d32b21587b2e576a04992acdc0b90aa36912942094d
-
SSDEEP
24576:EyrQoR/eW1x/ehm8Azbui+6NPZVN8TUxP9z3lp6CT+T5Pn:Tr/Rmgx/szAzyYzVXn7Tu5P
Static task
static1
Behavioral task
behavioral1
Sample
54a7511be551de1a5ea821ed676cbdbf05fc0889a870c07077a4c3fa60565f39.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
54a7511be551de1a5ea821ed676cbdbf05fc0889a870c07077a4c3fa60565f39.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dream
77.91.68.253:4138
-
auth_value
7b4f26a4ca794e30cee1032d5cb62f5c
Targets
-
-
Target
54a7511be551de1a5ea821ed676cbdbf05fc0889a870c07077a4c3fa60565f39
-
Size
1.0MB
-
MD5
8c45ad8fe87e67822daf4bcdec93ea50
-
SHA1
57d76207373dd279dcf0d702330bff2911e5f06f
-
SHA256
54a7511be551de1a5ea821ed676cbdbf05fc0889a870c07077a4c3fa60565f39
-
SHA512
238b4a5cfbd07718286b13a2e04bef65503d0079f0fe24121db972a8a73bd8737cda96bca62829cb468f5d32b21587b2e576a04992acdc0b90aa36912942094d
-
SSDEEP
24576:EyrQoR/eW1x/ehm8Azbui+6NPZVN8TUxP9z3lp6CT+T5Pn:Tr/Rmgx/szAzyYzVXn7Tu5P
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-