General
-
Target
6f6906098f834516ca794eb536b960eb9d092c3e422425b95476d551fbf286f1
-
Size
1.0MB
-
Sample
230519-pp7xesgf5s
-
MD5
7c46d22454bce2a3a83068a7324e1801
-
SHA1
8e99ba6fac44fa0d1de019d0315bad2b7b98cd5b
-
SHA256
6f6906098f834516ca794eb536b960eb9d092c3e422425b95476d551fbf286f1
-
SHA512
f49e53b0449240cbffd9a80dcf440d4b54b668f698ccdc512c9f3a2b42e1281c7ca4b3b5b0fd4448878279e6015abf5c11db88e72da85ef1fe1a632ffba4b370
-
SSDEEP
24576:5yiGzSi5TJX5EV0edBZnCnqutcUoaNRZ1:siu5TJeV0ed/9n+
Static task
static1
Behavioral task
behavioral1
Sample
6f6906098f834516ca794eb536b960eb9d092c3e422425b95476d551fbf286f1.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
duper
77.91.68.253:19065
-
auth_value
57e17ebbdb18f4882b95fe05402ef1c8
Targets
-
-
Target
6f6906098f834516ca794eb536b960eb9d092c3e422425b95476d551fbf286f1
-
Size
1.0MB
-
MD5
7c46d22454bce2a3a83068a7324e1801
-
SHA1
8e99ba6fac44fa0d1de019d0315bad2b7b98cd5b
-
SHA256
6f6906098f834516ca794eb536b960eb9d092c3e422425b95476d551fbf286f1
-
SHA512
f49e53b0449240cbffd9a80dcf440d4b54b668f698ccdc512c9f3a2b42e1281c7ca4b3b5b0fd4448878279e6015abf5c11db88e72da85ef1fe1a632ffba4b370
-
SSDEEP
24576:5yiGzSi5TJX5EV0edBZnCnqutcUoaNRZ1:siu5TJeV0ed/9n+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-