General
-
Target
eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62
-
Size
1.0MB
-
Sample
230520-e7lrssae44
-
MD5
a237127ec5459f47b3587be010b25237
-
SHA1
4fc69196aedcf87803fcf94645522f7e14383b22
-
SHA256
eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62
-
SHA512
076aa8a1b53351d325cedf8db86730ec983afdbcec513105dadbcbbeb580f3d93d2aab03f8ef04337a645f2003d9c9e557491b06ce317d4d7e84b7bb4e424105
-
SSDEEP
24576:myvR0QFbsm/HCemX9ctV5GLg+5KVu9n+JVpNza:1JFFYtYV65ku9+7
Static task
static1
Behavioral task
behavioral1
Sample
eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
leren
77.91.68.253:19065
-
auth_value
4002956b5a03c59e4252363b86bc7713
Targets
-
-
Target
eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62
-
Size
1.0MB
-
MD5
a237127ec5459f47b3587be010b25237
-
SHA1
4fc69196aedcf87803fcf94645522f7e14383b22
-
SHA256
eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62
-
SHA512
076aa8a1b53351d325cedf8db86730ec983afdbcec513105dadbcbbeb580f3d93d2aab03f8ef04337a645f2003d9c9e557491b06ce317d4d7e84b7bb4e424105
-
SSDEEP
24576:myvR0QFbsm/HCemX9ctV5GLg+5KVu9n+JVpNza:1JFFYtYV65ku9+7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-