General
-
Target
c6328f3ef0e7d46a2bbe259b770d105e6db662d05f3c02bf78029c13f730e1c6
-
Size
1.0MB
-
Sample
230520-rtspeacg38
-
MD5
68dc977a078401b35e21de9b4828cb9d
-
SHA1
2fbed8155992c44f6b0511d8ea87f320360bd408
-
SHA256
c6328f3ef0e7d46a2bbe259b770d105e6db662d05f3c02bf78029c13f730e1c6
-
SHA512
07603857bbafb4a5c4dc34d5fae2fd767a14318ad4d936b14b42b9cbd4baa600082338a2f620bdb6b5fc0c612efc0651fbddb56566d1e131d8845460d0e98cdc
-
SSDEEP
24576:1yxcJz4mJ1KjMBGoNmiNC2qvvu23PDpC5qw3:QmyBcGFO6bC5q
Static task
static1
Behavioral task
behavioral1
Sample
c6328f3ef0e7d46a2bbe259b770d105e6db662d05f3c02bf78029c13f730e1c6.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
leren
77.91.68.253:19065
-
auth_value
4002956b5a03c59e4252363b86bc7713
Targets
-
-
Target
c6328f3ef0e7d46a2bbe259b770d105e6db662d05f3c02bf78029c13f730e1c6
-
Size
1.0MB
-
MD5
68dc977a078401b35e21de9b4828cb9d
-
SHA1
2fbed8155992c44f6b0511d8ea87f320360bd408
-
SHA256
c6328f3ef0e7d46a2bbe259b770d105e6db662d05f3c02bf78029c13f730e1c6
-
SHA512
07603857bbafb4a5c4dc34d5fae2fd767a14318ad4d936b14b42b9cbd4baa600082338a2f620bdb6b5fc0c612efc0651fbddb56566d1e131d8845460d0e98cdc
-
SSDEEP
24576:1yxcJz4mJ1KjMBGoNmiNC2qvvu23PDpC5qw3:QmyBcGFO6bC5q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-