General
-
Target
4fbe8074915dd4cec81597c286bf7688bf3c0ca2060ac5388c1518b273dfe914
-
Size
767KB
-
Sample
230526-gfqyjsef3t
-
MD5
9c8338c7eab43a8a3065c4edd1b8ebd3
-
SHA1
11b732a3dd41a99f0713b3ff6681fafdc0b84d71
-
SHA256
4fbe8074915dd4cec81597c286bf7688bf3c0ca2060ac5388c1518b273dfe914
-
SHA512
fc084fa2b4884d06522b19e648a9a22926c053134688a17c0e0a98beb78071924cb53ba416a1ade3ff00035f61f9cbb75179405656af2ccb5caf1a594f66d045
-
SSDEEP
12288:PMr/y90dVrkcU9dkvAHoztxHrqBiCJ76cPJ0vsF8fupdPI+OtFz79ptvGkBvNnMo:sy4xvU9av+oztxeBDJWa0vCdPq79Lukb
Static task
static1
Behavioral task
behavioral1
Sample
4fbe8074915dd4cec81597c286bf7688bf3c0ca2060ac5388c1518b273dfe914.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
4fbe8074915dd4cec81597c286bf7688bf3c0ca2060ac5388c1518b273dfe914
-
Size
767KB
-
MD5
9c8338c7eab43a8a3065c4edd1b8ebd3
-
SHA1
11b732a3dd41a99f0713b3ff6681fafdc0b84d71
-
SHA256
4fbe8074915dd4cec81597c286bf7688bf3c0ca2060ac5388c1518b273dfe914
-
SHA512
fc084fa2b4884d06522b19e648a9a22926c053134688a17c0e0a98beb78071924cb53ba416a1ade3ff00035f61f9cbb75179405656af2ccb5caf1a594f66d045
-
SSDEEP
12288:PMr/y90dVrkcU9dkvAHoztxHrqBiCJ76cPJ0vsF8fupdPI+OtFz79ptvGkBvNnMo:sy4xvU9av+oztxeBDJWa0vCdPq79Lukb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-