General
-
Target
8b3f25b68155b8b1fc71d3a349abfc4b6c54c31eec098c44a39494bc5318f735
-
Size
1.0MB
-
Sample
230521-ptasgsch4z
-
MD5
3213546b7334bead27f6361fb70484b3
-
SHA1
286effee002bca11b103df615f8aeefc90e9bbf3
-
SHA256
8b3f25b68155b8b1fc71d3a349abfc4b6c54c31eec098c44a39494bc5318f735
-
SHA512
d9a9f5e15d79b9df10e7a85287a5de1f571a09af7e15b078bed58cb9b5d0c792f57e301485a959354502b73194f59098ba99832c9f2c73aac1a8dce247296928
-
SSDEEP
24576:4yhj/22gFdZmceTtZyGmbGeuSVpo5FALUqcq3VtjYess:/Z22grZmcaXyGmbxMjALUqXFtx
Static task
static1
Behavioral task
behavioral1
Sample
8b3f25b68155b8b1fc71d3a349abfc4b6c54c31eec098c44a39494bc5318f735.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
8b3f25b68155b8b1fc71d3a349abfc4b6c54c31eec098c44a39494bc5318f735
-
Size
1.0MB
-
MD5
3213546b7334bead27f6361fb70484b3
-
SHA1
286effee002bca11b103df615f8aeefc90e9bbf3
-
SHA256
8b3f25b68155b8b1fc71d3a349abfc4b6c54c31eec098c44a39494bc5318f735
-
SHA512
d9a9f5e15d79b9df10e7a85287a5de1f571a09af7e15b078bed58cb9b5d0c792f57e301485a959354502b73194f59098ba99832c9f2c73aac1a8dce247296928
-
SSDEEP
24576:4yhj/22gFdZmceTtZyGmbGeuSVpo5FALUqcq3VtjYess:/Z22grZmcaXyGmbxMjALUqXFtx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-