General
-
Target
585e48e54d381b97b60a4bab5ecd9540571f0bfa41f139a3fed78b1f01598cb4
-
Size
1.0MB
-
Sample
230522-jcn1wseg78
-
MD5
488076715f801aef24126fbe4f8ebe6c
-
SHA1
bc752a0d0ac2b4ec41b7ece6c5de5d5e0a331664
-
SHA256
585e48e54d381b97b60a4bab5ecd9540571f0bfa41f139a3fed78b1f01598cb4
-
SHA512
df9da5b9a0c86138d0de3f825e867482b7ca61911e22e8488096dbfc1dcb6c915293dfac8000cbe1c024fd21d6a962ff2f8b7c4b9eaa34266bc570f16fd59598
-
SSDEEP
24576:pytcZcXFAFNEGRq0pF8r5IySkzLRxOmskmekJ3pp:cSG1aFRqSmrh/rOmsfJ3p
Static task
static1
Behavioral task
behavioral1
Sample
585e48e54d381b97b60a4bab5ecd9540571f0bfa41f139a3fed78b1f01598cb4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
585e48e54d381b97b60a4bab5ecd9540571f0bfa41f139a3fed78b1f01598cb4
-
Size
1.0MB
-
MD5
488076715f801aef24126fbe4f8ebe6c
-
SHA1
bc752a0d0ac2b4ec41b7ece6c5de5d5e0a331664
-
SHA256
585e48e54d381b97b60a4bab5ecd9540571f0bfa41f139a3fed78b1f01598cb4
-
SHA512
df9da5b9a0c86138d0de3f825e867482b7ca61911e22e8488096dbfc1dcb6c915293dfac8000cbe1c024fd21d6a962ff2f8b7c4b9eaa34266bc570f16fd59598
-
SSDEEP
24576:pytcZcXFAFNEGRq0pF8r5IySkzLRxOmskmekJ3pp:cSG1aFRqSmrh/rOmsfJ3p
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-