General
-
Target
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0
-
Size
1.0MB
-
Sample
230521-mp9pxahe22
-
MD5
2d612a2fe9ca705de28e3cbd4338da04
-
SHA1
9b9a0343905bf7916b90758109a8ef445ed84bf4
-
SHA256
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0
-
SHA512
c3671673b75ad86341f14386101896b7e4bbdc4b589219c95e05d29a9919882adcb4c71f3ee3558604dc63c286d1c561268c0a1f6b507e689274871829b6916d
-
SSDEEP
24576:uydh4YWW8ZWDqQRq5Zwr68kelpL4zNTXaCkaa3:9D4Yf8ADHRq5Zf8d7QTqFa
Static task
static1
Behavioral task
behavioral1
Sample
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0
-
Size
1.0MB
-
MD5
2d612a2fe9ca705de28e3cbd4338da04
-
SHA1
9b9a0343905bf7916b90758109a8ef445ed84bf4
-
SHA256
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0
-
SHA512
c3671673b75ad86341f14386101896b7e4bbdc4b589219c95e05d29a9919882adcb4c71f3ee3558604dc63c286d1c561268c0a1f6b507e689274871829b6916d
-
SSDEEP
24576:uydh4YWW8ZWDqQRq5Zwr68kelpL4zNTXaCkaa3:9D4Yf8ADHRq5Zf8d7QTqFa
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-