General
-
Target
e7db1395cb68f4ee7670003caec6ae7a657b83813ce8d9c471d9f7a7eaecaf0a
-
Size
764KB
-
Sample
230526-h1ypkaeg9y
-
MD5
86a039fb5db1d01d5f3683b557f2bc74
-
SHA1
5bae7653e94f2d3f8df7d424637c9c2e1aafd8a5
-
SHA256
e7db1395cb68f4ee7670003caec6ae7a657b83813ce8d9c471d9f7a7eaecaf0a
-
SHA512
95c9515193e6f8fad2893b2af2fe6d86f74186aa45e1393c5026bfaef7dd7903e170211d579f37f264b74cae2d9643fafc07e57928c861ef14572ee5d658fe78
-
SSDEEP
12288:9MrUy90zUweZTSb/cBSWzRxgxnBczwtvnYcWEG5mI/kBNJnM6tIY+iETHOu:VyQUwI8/clHg5KWY7wik/JM63+vHn
Static task
static1
Behavioral task
behavioral1
Sample
e7db1395cb68f4ee7670003caec6ae7a657b83813ce8d9c471d9f7a7eaecaf0a.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
e7db1395cb68f4ee7670003caec6ae7a657b83813ce8d9c471d9f7a7eaecaf0a
-
Size
764KB
-
MD5
86a039fb5db1d01d5f3683b557f2bc74
-
SHA1
5bae7653e94f2d3f8df7d424637c9c2e1aafd8a5
-
SHA256
e7db1395cb68f4ee7670003caec6ae7a657b83813ce8d9c471d9f7a7eaecaf0a
-
SHA512
95c9515193e6f8fad2893b2af2fe6d86f74186aa45e1393c5026bfaef7dd7903e170211d579f37f264b74cae2d9643fafc07e57928c861ef14572ee5d658fe78
-
SSDEEP
12288:9MrUy90zUweZTSb/cBSWzRxgxnBczwtvnYcWEG5mI/kBNJnM6tIY+iETHOu:VyQUwI8/clHg5KWY7wik/JM63+vHn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-