General
-
Target
57f77cf9a41813ffdc4cf4a9ed1c36d7265983e52d0e7b212baf4e217ea55735
-
Size
771KB
-
Sample
230526-vtt41sha7t
-
MD5
42d96620695d0c672e6ad6398694e90f
-
SHA1
6b9da3b333b2e64f08840f627ecf9da3ee63abcc
-
SHA256
57f77cf9a41813ffdc4cf4a9ed1c36d7265983e52d0e7b212baf4e217ea55735
-
SHA512
be4e1fa2166dd6c1291f86d6dddbb689e9d9ddcad64e72da66856ce4348c4777e35f72ef291f7b4f5ed73013fbf119e6ff77cff440a47f810db3c3875074303b
-
SSDEEP
24576:ZypEkd0HwhMALln4h4OlIYPjs390fJbvjGbWqD:MrEwhj1YPQtgxv
Static task
static1
Behavioral task
behavioral1
Sample
57f77cf9a41813ffdc4cf4a9ed1c36d7265983e52d0e7b212baf4e217ea55735.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
disa
83.97.73.122:19062
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Extracted
redline
goga
83.97.73.122:19062
-
auth_value
6d57dff6d3c42dddb8a76dc276b8467f
Targets
-
-
Target
57f77cf9a41813ffdc4cf4a9ed1c36d7265983e52d0e7b212baf4e217ea55735
-
Size
771KB
-
MD5
42d96620695d0c672e6ad6398694e90f
-
SHA1
6b9da3b333b2e64f08840f627ecf9da3ee63abcc
-
SHA256
57f77cf9a41813ffdc4cf4a9ed1c36d7265983e52d0e7b212baf4e217ea55735
-
SHA512
be4e1fa2166dd6c1291f86d6dddbb689e9d9ddcad64e72da66856ce4348c4777e35f72ef291f7b4f5ed73013fbf119e6ff77cff440a47f810db3c3875074303b
-
SSDEEP
24576:ZypEkd0HwhMALln4h4OlIYPjs390fJbvjGbWqD:MrEwhj1YPQtgxv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-