General
-
Target
f47bae2504d557c4b8f55d7737c9ee436a4508cf8a08aa3cdda4192d2416264e
-
Size
768KB
-
Sample
230525-tty8asbh2x
-
MD5
17ad98443b94e6e98f7aed8194f27d36
-
SHA1
93f2e10a21d7f0eb1b3c98825b495e76401727a5
-
SHA256
f47bae2504d557c4b8f55d7737c9ee436a4508cf8a08aa3cdda4192d2416264e
-
SHA512
83b4bc2aadc61325b779d4f0b26ba30f0260cdea9b21b8beda8c83b3255cb2c133acb194a7bef8690cfddf166ac12d572795ad76303c93198eccf69e8f85af4d
-
SSDEEP
12288:QMrpy905I8Ky5Ij99gIFlDylPaQAFYjdShv436pOihiJ+Q+fcavK2bWmE9CQ:py6l+j9iIlDylS5YjkhvS6/hSj+kd2bs
Static task
static1
Behavioral task
behavioral1
Sample
f47bae2504d557c4b8f55d7737c9ee436a4508cf8a08aa3cdda4192d2416264e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Targets
-
-
Target
f47bae2504d557c4b8f55d7737c9ee436a4508cf8a08aa3cdda4192d2416264e
-
Size
768KB
-
MD5
17ad98443b94e6e98f7aed8194f27d36
-
SHA1
93f2e10a21d7f0eb1b3c98825b495e76401727a5
-
SHA256
f47bae2504d557c4b8f55d7737c9ee436a4508cf8a08aa3cdda4192d2416264e
-
SHA512
83b4bc2aadc61325b779d4f0b26ba30f0260cdea9b21b8beda8c83b3255cb2c133acb194a7bef8690cfddf166ac12d572795ad76303c93198eccf69e8f85af4d
-
SSDEEP
12288:QMrpy905I8Ky5Ij99gIFlDylPaQAFYjdShv436pOihiJ+Q+fcavK2bWmE9CQ:py6l+j9iIlDylS5YjkhvS6/hSj+kd2bs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-