General
-
Target
0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862
-
Size
1.0MB
-
Sample
230521-k319ksbh5s
-
MD5
8c0d604ecea209bb725cd4826655e578
-
SHA1
476c0f6f5c2fe79b4c66128d60bdcbcb96192477
-
SHA256
0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862
-
SHA512
ae372a52ee56580c249d9bc8c2c548402ce436ca6dad7d3843a047bb418a2a11753bb8a4da0f1e862ccb8d236cc5dc58f1e1d68ad68c567142bde97438359b82
-
SSDEEP
24576:RyRKvkGesHtqwf3EGK1x6Gc+uhswP8pr/wIBbz:EWVtqiU1x6GcPhjP8prYIBb
Static task
static1
Behavioral task
behavioral1
Sample
0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862
-
Size
1.0MB
-
MD5
8c0d604ecea209bb725cd4826655e578
-
SHA1
476c0f6f5c2fe79b4c66128d60bdcbcb96192477
-
SHA256
0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862
-
SHA512
ae372a52ee56580c249d9bc8c2c548402ce436ca6dad7d3843a047bb418a2a11753bb8a4da0f1e862ccb8d236cc5dc58f1e1d68ad68c567142bde97438359b82
-
SSDEEP
24576:RyRKvkGesHtqwf3EGK1x6Gc+uhswP8pr/wIBbz:EWVtqiU1x6GcPhjP8prYIBb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-