General
-
Target
b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489
-
Size
1.0MB
-
Sample
230521-td2cqaba67
-
MD5
d8a235d51d36abb78d3b593c133cb367
-
SHA1
ebcd9db75420377b57d319fe5afadf02d421e910
-
SHA256
b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489
-
SHA512
4302b0d8deb70977675e90c98b874b43054f9a1184ab7c1e2e01b6d8660cafc79e1fc0c75e99f8c192f9a2af1a65bc7943c379598bf49d536090b419a8e67c0e
-
SSDEEP
24576:zyca6EQtxsqqSPVim/ldmQy8YkZvogz8oS5k:GcaQfqSIm/ls9kZvoFoS5
Static task
static1
Behavioral task
behavioral1
Sample
b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489
-
Size
1.0MB
-
MD5
d8a235d51d36abb78d3b593c133cb367
-
SHA1
ebcd9db75420377b57d319fe5afadf02d421e910
-
SHA256
b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489
-
SHA512
4302b0d8deb70977675e90c98b874b43054f9a1184ab7c1e2e01b6d8660cafc79e1fc0c75e99f8c192f9a2af1a65bc7943c379598bf49d536090b419a8e67c0e
-
SSDEEP
24576:zyca6EQtxsqqSPVim/ldmQy8YkZvogz8oS5k:GcaQfqSIm/ls9kZvoFoS5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-