General
-
Target
e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f
-
Size
1.0MB
-
Sample
230520-hpy6ysba57
-
MD5
dc7ca07b88c5d05c340717bd28400dcf
-
SHA1
f625ef3f8c1eecf24dac95b70b4a2e590b404376
-
SHA256
e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f
-
SHA512
9e4837b4ecde6db2d4276fb5087d6b78e032e81ff41c8f804478b2fd3fdd976fb2e85b68f90ea4a50e4b4f0a2527de72df3a4267ff032a1fcd5b60b9fe552f03
-
SSDEEP
24576:SyXfs879l6688meMoKPeq3sk/Sd0fZfK2NXa7:5XflH3+eDX90JfX
Static task
static1
Behavioral task
behavioral1
Sample
e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
meren
77.91.68.253:19065
-
auth_value
a26557b435e44b55fdd4708fbba97d21
Targets
-
-
Target
e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f
-
Size
1.0MB
-
MD5
dc7ca07b88c5d05c340717bd28400dcf
-
SHA1
f625ef3f8c1eecf24dac95b70b4a2e590b404376
-
SHA256
e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f
-
SHA512
9e4837b4ecde6db2d4276fb5087d6b78e032e81ff41c8f804478b2fd3fdd976fb2e85b68f90ea4a50e4b4f0a2527de72df3a4267ff032a1fcd5b60b9fe552f03
-
SSDEEP
24576:SyXfs879l6688meMoKPeq3sk/Sd0fZfK2NXa7:5XflH3+eDX90JfX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-