General
-
Target
ded37aa507056d90841c0d326d36803e70dc2fc8d006246088eb0507f10f125a
-
Size
767KB
-
Sample
230526-fhe4dsed8y
-
MD5
b1e5a84e6ef60ceb6a69f8adb8fd445a
-
SHA1
3d57040bf0bd343223aea1c31084880f82d68bf0
-
SHA256
ded37aa507056d90841c0d326d36803e70dc2fc8d006246088eb0507f10f125a
-
SHA512
ed74cc51427cc613e2566fbea06bc7b678566c60af0b58a7daaeccc5be336c3024cbcba506f9f7607d7b6311a9230b3155c7365ca8bb03eda0b7ba26e78ef2a9
-
SSDEEP
12288:1MrRy90TIrpHnL3CNKfYZrNI9IXgTe03nwsD1RR/CFNyz3evGkBGInM8tIW+4EnM:cyFtH8RZrG+gTeY17RCF23eukoIM81+m
Static task
static1
Behavioral task
behavioral1
Sample
ded37aa507056d90841c0d326d36803e70dc2fc8d006246088eb0507f10f125a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ded37aa507056d90841c0d326d36803e70dc2fc8d006246088eb0507f10f125a.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
ded37aa507056d90841c0d326d36803e70dc2fc8d006246088eb0507f10f125a
-
Size
767KB
-
MD5
b1e5a84e6ef60ceb6a69f8adb8fd445a
-
SHA1
3d57040bf0bd343223aea1c31084880f82d68bf0
-
SHA256
ded37aa507056d90841c0d326d36803e70dc2fc8d006246088eb0507f10f125a
-
SHA512
ed74cc51427cc613e2566fbea06bc7b678566c60af0b58a7daaeccc5be336c3024cbcba506f9f7607d7b6311a9230b3155c7365ca8bb03eda0b7ba26e78ef2a9
-
SSDEEP
12288:1MrRy90TIrpHnL3CNKfYZrNI9IXgTe03nwsD1RR/CFNyz3evGkBGInM8tIW+4EnM:cyFtH8RZrG+gTeY17RCF23eukoIM81+m
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-