General
-
Target
71ff8da09c59d40202875781d50b4414481a70a0dc0702ce1e0d4dfeca1d8ba5
-
Size
771KB
-
Sample
230527-18x24sdg3s
-
MD5
1aca308ac9134732f585a7f611c61e11
-
SHA1
20f0130615f1d35fc3b75ba1013ea5b90c1d5a02
-
SHA256
71ff8da09c59d40202875781d50b4414481a70a0dc0702ce1e0d4dfeca1d8ba5
-
SHA512
f42aef12fd4d580f07d1cb2f42baa654dcdc8e0158e990ecdffe72d639d019cd540689b82e9b3cc0824a5a0ddc7203903439103481fb5481e485784376721f83
-
SSDEEP
24576:zyiMay62FCWzWl+pPTsawFbb90bNbFjj9F1:G+nWJBTsaChgdFfX
Static task
static1
Behavioral task
behavioral1
Sample
71ff8da09c59d40202875781d50b4414481a70a0dc0702ce1e0d4dfeca1d8ba5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
71ff8da09c59d40202875781d50b4414481a70a0dc0702ce1e0d4dfeca1d8ba5.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
disa
83.97.73.122:19062
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Extracted
redline
goga
83.97.73.122:19062
-
auth_value
6d57dff6d3c42dddb8a76dc276b8467f
Targets
-
-
Target
71ff8da09c59d40202875781d50b4414481a70a0dc0702ce1e0d4dfeca1d8ba5
-
Size
771KB
-
MD5
1aca308ac9134732f585a7f611c61e11
-
SHA1
20f0130615f1d35fc3b75ba1013ea5b90c1d5a02
-
SHA256
71ff8da09c59d40202875781d50b4414481a70a0dc0702ce1e0d4dfeca1d8ba5
-
SHA512
f42aef12fd4d580f07d1cb2f42baa654dcdc8e0158e990ecdffe72d639d019cd540689b82e9b3cc0824a5a0ddc7203903439103481fb5481e485784376721f83
-
SSDEEP
24576:zyiMay62FCWzWl+pPTsawFbb90bNbFjj9F1:G+nWJBTsaChgdFfX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-