General
-
Target
3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588
-
Size
1.0MB
-
Sample
230519-1ekvpabb41
-
MD5
926ec1f0b46b16c29bef685e50807063
-
SHA1
2d61bcc795a95004a0b32711bfa5ab2cd434bf09
-
SHA256
3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588
-
SHA512
2953e5ff1d5ca539c2a1042e1589af6043c8640bc7a2d3061829721ca20eda0e9ff98debbd56d7c0bff7af378a71f30b072fbadf38068c76283a4043eb4510aa
-
SSDEEP
24576:Gyeysq2vc48dk7H/N8qP2NrMY8tyTTL9b:Veoa7Hlyt8UT1
Static task
static1
Behavioral task
behavioral1
Sample
3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588
-
Size
1.0MB
-
MD5
926ec1f0b46b16c29bef685e50807063
-
SHA1
2d61bcc795a95004a0b32711bfa5ab2cd434bf09
-
SHA256
3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588
-
SHA512
2953e5ff1d5ca539c2a1042e1589af6043c8640bc7a2d3061829721ca20eda0e9ff98debbd56d7c0bff7af378a71f30b072fbadf38068c76283a4043eb4510aa
-
SSDEEP
24576:Gyeysq2vc48dk7H/N8qP2NrMY8tyTTL9b:Veoa7Hlyt8UT1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-