General
-
Target
090c3cb6e9d19fd8e45158d2764d4079944a91e046c16161b20ce069584b720d
-
Size
767KB
-
Sample
230525-yppwaacb33
-
MD5
1c073a7cdec912cd8a3dd894964f50d0
-
SHA1
de8018ce906516a110c80c9d442e1d3ed9af7948
-
SHA256
090c3cb6e9d19fd8e45158d2764d4079944a91e046c16161b20ce069584b720d
-
SHA512
48e1a47d7817a5542c89f3e5e6c9d87f69acdb771e0f94a4d649e9fecbd82def3d7b0780332c54090a81b1b821d019b2aba43d5f8e6e1591cbcd2d6a5ad07a1b
-
SSDEEP
12288:GMrvy905O3PRBEYFQ7VP8Vsq3gKBFnYI1tmVzLUjDn0kBljnMLtIW+WESO:RyZ3PRSYKP8Vn3hNWBLC0kzjML1+N
Static task
static1
Behavioral task
behavioral1
Sample
090c3cb6e9d19fd8e45158d2764d4079944a91e046c16161b20ce069584b720d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
090c3cb6e9d19fd8e45158d2764d4079944a91e046c16161b20ce069584b720d
-
Size
767KB
-
MD5
1c073a7cdec912cd8a3dd894964f50d0
-
SHA1
de8018ce906516a110c80c9d442e1d3ed9af7948
-
SHA256
090c3cb6e9d19fd8e45158d2764d4079944a91e046c16161b20ce069584b720d
-
SHA512
48e1a47d7817a5542c89f3e5e6c9d87f69acdb771e0f94a4d649e9fecbd82def3d7b0780332c54090a81b1b821d019b2aba43d5f8e6e1591cbcd2d6a5ad07a1b
-
SSDEEP
12288:GMrvy905O3PRBEYFQ7VP8Vsq3gKBFnYI1tmVzLUjDn0kBljnMLtIW+WESO:RyZ3PRSYKP8Vn3hNWBLC0kzjML1+N
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-