General
-
Target
cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad
-
Size
1.0MB
-
Sample
230523-2na8aaaf61
-
MD5
441a7c9a689f45bfe9c9899ece724580
-
SHA1
81c4a23cfc105091c0ff89fc76b70b09e864e147
-
SHA256
cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad
-
SHA512
780e42d1fe3392e205d0c859ee513b8e99fa4986670210c8663baaf7dc3176ceab7efbaccd6c9c04e59b9be176a4f600664ab01f934d9e74bd98759276a850cf
-
SSDEEP
24576:pycyOYqNixBsvwUVkAGMW8sLNUHvQnyu/U0T834E/x:ccyOYqN2ZOdV3i6vQnd80TGd/
Static task
static1
Behavioral task
behavioral1
Sample
cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Targets
-
-
Target
cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad
-
Size
1.0MB
-
MD5
441a7c9a689f45bfe9c9899ece724580
-
SHA1
81c4a23cfc105091c0ff89fc76b70b09e864e147
-
SHA256
cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad
-
SHA512
780e42d1fe3392e205d0c859ee513b8e99fa4986670210c8663baaf7dc3176ceab7efbaccd6c9c04e59b9be176a4f600664ab01f934d9e74bd98759276a850cf
-
SSDEEP
24576:pycyOYqNixBsvwUVkAGMW8sLNUHvQnyu/U0T834E/x:ccyOYqN2ZOdV3i6vQnd80TGd/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-