General
-
Target
939db280cedd31c79a626bba64808ce149a813fdde3412bf94742bcbfba1ced4
-
Size
1022KB
-
Sample
230522-jhflpshf3s
-
MD5
4845566da902162ddfcf4fc71841c895
-
SHA1
c186fdd644007cd5f37f5528ab5cd9de09264018
-
SHA256
939db280cedd31c79a626bba64808ce149a813fdde3412bf94742bcbfba1ced4
-
SHA512
4ef414d908c0b0e4d9e45f4b2c6fe0f617769ef5997b0beebaad8403cce171dbd15e5b17b200a9ac65ef7e3155e6b549fabdde5537cdbf5344395410e3b59bb5
-
SSDEEP
24576:qyTjw7bL4eTTaM6e17CqTkYEJ1AStvEE+E6t90p8wFhX:xTji4eB17CqQYEIStJ5OwF
Static task
static1
Behavioral task
behavioral1
Sample
939db280cedd31c79a626bba64808ce149a813fdde3412bf94742bcbfba1ced4.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
luza
185.161.248.37:4138
-
auth_value
1261701914d508e02e8b4f25d38bc7f9
Targets
-
-
Target
939db280cedd31c79a626bba64808ce149a813fdde3412bf94742bcbfba1ced4
-
Size
1022KB
-
MD5
4845566da902162ddfcf4fc71841c895
-
SHA1
c186fdd644007cd5f37f5528ab5cd9de09264018
-
SHA256
939db280cedd31c79a626bba64808ce149a813fdde3412bf94742bcbfba1ced4
-
SHA512
4ef414d908c0b0e4d9e45f4b2c6fe0f617769ef5997b0beebaad8403cce171dbd15e5b17b200a9ac65ef7e3155e6b549fabdde5537cdbf5344395410e3b59bb5
-
SSDEEP
24576:qyTjw7bL4eTTaM6e17CqTkYEJ1AStvEE+E6t90p8wFhX:xTji4eB17CqQYEIStJ5OwF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-