General
-
Target
b53e299f2f984b8bb4d8db34603fc95289f03d52718371f51d1ecc3f8ce160c6
-
Size
771KB
-
Sample
230526-2kkbsahh3t
-
MD5
bf718e762c6ca35a331600252a0137d2
-
SHA1
be05d3d7f84f33334b1640f1e2ce67db5e77b72c
-
SHA256
b53e299f2f984b8bb4d8db34603fc95289f03d52718371f51d1ecc3f8ce160c6
-
SHA512
6b887d75b13ca65d036886a7e047311195eb99566c507600a6fece7b3fe1a3b4a5d98c69993a08c7c7df01b820e6ccd8fedc57d53724efbf1afb9fd9b924c24f
-
SSDEEP
24576:Py7Fv5TmTWLfFPz0ONnLFES90nRbsjfYty:a7FZLhPQONLTA5s0
Static task
static1
Behavioral task
behavioral1
Sample
b53e299f2f984b8bb4d8db34603fc95289f03d52718371f51d1ecc3f8ce160c6.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
disa
83.97.73.122:19062
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Extracted
redline
goga
83.97.73.122:19062
-
auth_value
6d57dff6d3c42dddb8a76dc276b8467f
Targets
-
-
Target
b53e299f2f984b8bb4d8db34603fc95289f03d52718371f51d1ecc3f8ce160c6
-
Size
771KB
-
MD5
bf718e762c6ca35a331600252a0137d2
-
SHA1
be05d3d7f84f33334b1640f1e2ce67db5e77b72c
-
SHA256
b53e299f2f984b8bb4d8db34603fc95289f03d52718371f51d1ecc3f8ce160c6
-
SHA512
6b887d75b13ca65d036886a7e047311195eb99566c507600a6fece7b3fe1a3b4a5d98c69993a08c7c7df01b820e6ccd8fedc57d53724efbf1afb9fd9b924c24f
-
SSDEEP
24576:Py7Fv5TmTWLfFPz0ONnLFES90nRbsjfYty:a7FZLhPQONLTA5s0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-