General
-
Target
9ee08a7b0cafb9fe0d9e5ebb49e3f9e42930c8a5558858e8bd1d5643fd5cd460
-
Size
770KB
-
Sample
230528-den6saed7y
-
MD5
5bb157469ad848d3cc3992cfd8a5b492
-
SHA1
5e8cbbff3aea62fff9b6a3acfb10cfe715beec36
-
SHA256
9ee08a7b0cafb9fe0d9e5ebb49e3f9e42930c8a5558858e8bd1d5643fd5cd460
-
SHA512
2563732ac775a174637e6f5d7e516693f930dadb5f8789ad8aea46133446640e64d609d920f39cd23c5aa87bf7c0fd182f2f756e453d6c5e939e2751ec1b85cf
-
SSDEEP
12288:mMr/y90BTABDk5Hk/2Dohz4LRkYazdk+h/uaC+4ucBVr8NDfe+949AIvZyo6O:NyNkxk/Zhz3XRy+4ucBVr85fe+KYzO
Static task
static1
Behavioral task
behavioral1
Sample
9ee08a7b0cafb9fe0d9e5ebb49e3f9e42930c8a5558858e8bd1d5643fd5cd460.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dura
83.97.73.127:19062
-
auth_value
44b7d6fb9572dea0d64d018139c3d208
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
9ee08a7b0cafb9fe0d9e5ebb49e3f9e42930c8a5558858e8bd1d5643fd5cd460
-
Size
770KB
-
MD5
5bb157469ad848d3cc3992cfd8a5b492
-
SHA1
5e8cbbff3aea62fff9b6a3acfb10cfe715beec36
-
SHA256
9ee08a7b0cafb9fe0d9e5ebb49e3f9e42930c8a5558858e8bd1d5643fd5cd460
-
SHA512
2563732ac775a174637e6f5d7e516693f930dadb5f8789ad8aea46133446640e64d609d920f39cd23c5aa87bf7c0fd182f2f756e453d6c5e939e2751ec1b85cf
-
SSDEEP
12288:mMr/y90BTABDk5Hk/2Dohz4LRkYazdk+h/uaC+4ucBVr8NDfe+949AIvZyo6O:NyNkxk/Zhz3XRy+4ucBVr85fe+KYzO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-