General
-
Target
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc
-
Size
1.0MB
-
Sample
230522-jlmjeseh43
-
MD5
98e90b98b55e836018b3ad82381064e7
-
SHA1
88fd0d8d014ab882121b27c60ebd8ac9bfe1887a
-
SHA256
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc
-
SHA512
18a10d3e4af17f51afee288c9563c4f2d8979b4c1ac4bfac541c7bc711663accbdffe813a08ec3bdcc9184d7d5a2f47c1d87c6a22ad143329e97594269e94c8f
-
SSDEEP
24576:/ys7ivxKudqGB0aZ+PFofyMp2xNPZyoPQX/7l+y:KpfdqGB6PFoffpUSYm/g
Static task
static1
Behavioral task
behavioral1
Sample
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc
-
Size
1.0MB
-
MD5
98e90b98b55e836018b3ad82381064e7
-
SHA1
88fd0d8d014ab882121b27c60ebd8ac9bfe1887a
-
SHA256
f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc
-
SHA512
18a10d3e4af17f51afee288c9563c4f2d8979b4c1ac4bfac541c7bc711663accbdffe813a08ec3bdcc9184d7d5a2f47c1d87c6a22ad143329e97594269e94c8f
-
SSDEEP
24576:/ys7ivxKudqGB0aZ+PFofyMp2xNPZyoPQX/7l+y:KpfdqGB6PFoffpUSYm/g
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-