General
-
Target
c178878971e7db165cc0d360f33dbb5fa9c745316c3a70b837f827eda2f4c3ff
-
Size
1.0MB
-
Sample
230527-3q298ade32
-
MD5
1c1acf91645de5e59b8992e3ea3ed6a1
-
SHA1
e2dd59e87519d4998fc991273f6c64f6a50a88ca
-
SHA256
c178878971e7db165cc0d360f33dbb5fa9c745316c3a70b837f827eda2f4c3ff
-
SHA512
b97304353009847d526cda1da9302e1960cde23a45a31febb5f834c9031eb4872e04903a9eba7371b0d0f7f5c2c3b0cb4e0f79d685dd3b92df0d07ab5d1e1ac7
-
SSDEEP
24576:rynqsJfgSQ66MWpcp564wGcAWncdCHUOmOLMUyG/v:enqsJfTQ6JWa6Pbc80OmOLMy
Static task
static1
Behavioral task
behavioral1
Sample
c178878971e7db165cc0d360f33dbb5fa9c745316c3a70b837f827eda2f4c3ff.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
lura
83.97.73.127:19062
-
auth_value
a32643486616d3c1378d2ef55bc4a5af
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
c178878971e7db165cc0d360f33dbb5fa9c745316c3a70b837f827eda2f4c3ff
-
Size
1.0MB
-
MD5
1c1acf91645de5e59b8992e3ea3ed6a1
-
SHA1
e2dd59e87519d4998fc991273f6c64f6a50a88ca
-
SHA256
c178878971e7db165cc0d360f33dbb5fa9c745316c3a70b837f827eda2f4c3ff
-
SHA512
b97304353009847d526cda1da9302e1960cde23a45a31febb5f834c9031eb4872e04903a9eba7371b0d0f7f5c2c3b0cb4e0f79d685dd3b92df0d07ab5d1e1ac7
-
SSDEEP
24576:rynqsJfgSQ66MWpcp564wGcAWncdCHUOmOLMUyG/v:enqsJfTQ6JWa6Pbc80OmOLMy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-