General
-
Target
c620bd31eb99e4436fe58a443d34c1d357e5402c0534de46b49628aecef8f271
-
Size
1.0MB
-
Sample
230525-pl343ahh85
-
MD5
1539dd13f7d062b31bd824dca347dfb5
-
SHA1
7c65a1b4e550aa7e198920ff0e4e508eae48aaed
-
SHA256
c620bd31eb99e4436fe58a443d34c1d357e5402c0534de46b49628aecef8f271
-
SHA512
690cffe1fbe37945a4323362fa7587c4165fbdc334ff1f1cc7d556e7d20a906722ca7f52f9a16adab3611c00cc1040ace1b831f61fe85a94bf7ad79de7a29f90
-
SSDEEP
24576:ty8kdbt85jrVvQ2uwJ0mfhMOmlgqOyUHbufvh4:Ihg8oXgg5yUqnh
Static task
static1
Malware Config
Extracted
redline
lina
83.97.73.122:19062
-
auth_value
13523aee5d194d7716b22eeab7de10ad
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Extracted
gurcu
https://api.telegram.org/bot6237712604:AAESgAGfaQ0EUC8eWgMd7kpAW_FEGRDRfDs/sendMessage?chat_id=880824160
Targets
-
-
Target
c620bd31eb99e4436fe58a443d34c1d357e5402c0534de46b49628aecef8f271
-
Size
1.0MB
-
MD5
1539dd13f7d062b31bd824dca347dfb5
-
SHA1
7c65a1b4e550aa7e198920ff0e4e508eae48aaed
-
SHA256
c620bd31eb99e4436fe58a443d34c1d357e5402c0534de46b49628aecef8f271
-
SHA512
690cffe1fbe37945a4323362fa7587c4165fbdc334ff1f1cc7d556e7d20a906722ca7f52f9a16adab3611c00cc1040ace1b831f61fe85a94bf7ad79de7a29f90
-
SSDEEP
24576:ty8kdbt85jrVvQ2uwJ0mfhMOmlgqOyUHbufvh4:Ihg8oXgg5yUqnh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-