General
-
Target
be02f14720ed2e9417424e01164e3a0f5e241db9d17f0eb063b5eb5587185acf
-
Size
767KB
-
Sample
230525-z5kf6scd77
-
MD5
2f195f5f98a28f9c11cac9bd60afd7cb
-
SHA1
26cf64ba92d5a33ed22110e25d76f71c30e4f0ae
-
SHA256
be02f14720ed2e9417424e01164e3a0f5e241db9d17f0eb063b5eb5587185acf
-
SHA512
cad0c42e9d37c85088487fe08a80310181e8303b49019b023f068e91d307fb7671df415ebb623298864c127c3ab0cf9304b783c53af6f829d1836a0bca2a3310
-
SSDEEP
12288:UMrCy906AeJYt0YSnBL6mkU5JEC2NmNAO0nhKL2jFjREkgNEvGkBfTnM8tIW+QEO:mypJpBLuU5D2NmNAO8K6BjBgNEuk1TMS
Static task
static1
Behavioral task
behavioral1
Sample
be02f14720ed2e9417424e01164e3a0f5e241db9d17f0eb063b5eb5587185acf.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
be02f14720ed2e9417424e01164e3a0f5e241db9d17f0eb063b5eb5587185acf
-
Size
767KB
-
MD5
2f195f5f98a28f9c11cac9bd60afd7cb
-
SHA1
26cf64ba92d5a33ed22110e25d76f71c30e4f0ae
-
SHA256
be02f14720ed2e9417424e01164e3a0f5e241db9d17f0eb063b5eb5587185acf
-
SHA512
cad0c42e9d37c85088487fe08a80310181e8303b49019b023f068e91d307fb7671df415ebb623298864c127c3ab0cf9304b783c53af6f829d1836a0bca2a3310
-
SSDEEP
12288:UMrCy906AeJYt0YSnBL6mkU5JEC2NmNAO0nhKL2jFjREkgNEvGkBfTnM8tIW+QEO:mypJpBLuU5D2NmNAO8K6BjBgNEuk1TMS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-