General
-
Target
384f799038ffb5991da8f7fdbef54275d8600ca36dfcf8d4003c2b60e7f8a82d
-
Size
1.0MB
-
Sample
230521-vagdtaea6w
-
MD5
2bdd8fa09dfc59226e3c67e064b8a4f5
-
SHA1
9ec8bb9cf7ff57384cc5cc124cd5c401f386e7ac
-
SHA256
384f799038ffb5991da8f7fdbef54275d8600ca36dfcf8d4003c2b60e7f8a82d
-
SHA512
193db9b7f1247a6cebd7bf1ce462cc6d1077045796967e15d032c821d3b5a4b6c79811e87e9dd696869fe1fd033edca42fa2c8d35f05f9ac12005744b9468304
-
SSDEEP
24576:Fy2SfxqPCFanVCboaxrjyZTp+o42lHDmTQNUj7:g2cqg6CboaxrjYTsuJDmTOU
Static task
static1
Behavioral task
behavioral1
Sample
384f799038ffb5991da8f7fdbef54275d8600ca36dfcf8d4003c2b60e7f8a82d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Targets
-
-
Target
384f799038ffb5991da8f7fdbef54275d8600ca36dfcf8d4003c2b60e7f8a82d
-
Size
1.0MB
-
MD5
2bdd8fa09dfc59226e3c67e064b8a4f5
-
SHA1
9ec8bb9cf7ff57384cc5cc124cd5c401f386e7ac
-
SHA256
384f799038ffb5991da8f7fdbef54275d8600ca36dfcf8d4003c2b60e7f8a82d
-
SHA512
193db9b7f1247a6cebd7bf1ce462cc6d1077045796967e15d032c821d3b5a4b6c79811e87e9dd696869fe1fd033edca42fa2c8d35f05f9ac12005744b9468304
-
SSDEEP
24576:Fy2SfxqPCFanVCboaxrjyZTp+o42lHDmTQNUj7:g2cqg6CboaxrjYTsuJDmTOU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-