General
-
Target
b920a38159c6df25e43cc47d1db2f279fa8a1e3bac1fb08778f1ac5cbdf7b5f2
-
Size
760KB
-
Sample
230527-wbzgfsce96
-
MD5
f0cc49421bce174cba27d9b51a52d089
-
SHA1
fd15bf53fc59662694ad3a54f0645c9ff946b1d1
-
SHA256
b920a38159c6df25e43cc47d1db2f279fa8a1e3bac1fb08778f1ac5cbdf7b5f2
-
SHA512
db2221619e490195c86ef6a4dc6d385901a6d634cad84a35f669a4b2d635f3ccd6e58c16648a449ceb9fdc342ce98f8d17ddfc1d7df3a1702116b81f36929ee0
-
SSDEEP
12288:GMrPy90NbTi6LhpkQv1eQ8La9xd3dzIYv4K87LuWo+iZevHD9Eg0Mh:JyeXLvkQwQ0a93Zv4K81kQvHD1t
Static task
static1
Behavioral task
behavioral1
Sample
b920a38159c6df25e43cc47d1db2f279fa8a1e3bac1fb08778f1ac5cbdf7b5f2.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dura
83.97.73.127:19062
-
auth_value
44b7d6fb9572dea0d64d018139c3d208
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
b920a38159c6df25e43cc47d1db2f279fa8a1e3bac1fb08778f1ac5cbdf7b5f2
-
Size
760KB
-
MD5
f0cc49421bce174cba27d9b51a52d089
-
SHA1
fd15bf53fc59662694ad3a54f0645c9ff946b1d1
-
SHA256
b920a38159c6df25e43cc47d1db2f279fa8a1e3bac1fb08778f1ac5cbdf7b5f2
-
SHA512
db2221619e490195c86ef6a4dc6d385901a6d634cad84a35f669a4b2d635f3ccd6e58c16648a449ceb9fdc342ce98f8d17ddfc1d7df3a1702116b81f36929ee0
-
SSDEEP
12288:GMrPy90NbTi6LhpkQv1eQ8La9xd3dzIYv4K87LuWo+iZevHD9Eg0Mh:JyeXLvkQwQ0a93Zv4K81kQvHD1t
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-