General
-
Target
39db680adbe401fd08e3fb972d5f9ed5818ea0005b68002658ade6a195bfd9ee
-
Size
767KB
-
Sample
230528-ffhfqsef7y
-
MD5
a9af31011bc0eec62e70eead2d56d18e
-
SHA1
265fdf93c48297df800e6abe174e61478d788390
-
SHA256
39db680adbe401fd08e3fb972d5f9ed5818ea0005b68002658ade6a195bfd9ee
-
SHA512
e79a286cec37b502a53c68ad70c15870396bb999a4e68d297ca28516eecd560e2efbc0e49aba8349fc0ba7919ec4957115315e45c28aee7e5df55acdea3812d9
-
SSDEEP
12288:/MrXy90sSzOTE0ipeGi+G2Amkg3Sac3ghWk/htAJ5OjkR/l0lLTWeuvGkBoynM8f:QyaOAY+G2pkKgghHLUOjkRKLhuukKyMy
Static task
static1
Behavioral task
behavioral1
Sample
39db680adbe401fd08e3fb972d5f9ed5818ea0005b68002658ade6a195bfd9ee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
39db680adbe401fd08e3fb972d5f9ed5818ea0005b68002658ade6a195bfd9ee.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Extracted
redline
greg
83.97.73.122:19062
-
auth_value
4c966a90781c6b4ab7f512d018696362
Targets
-
-
Target
39db680adbe401fd08e3fb972d5f9ed5818ea0005b68002658ade6a195bfd9ee
-
Size
767KB
-
MD5
a9af31011bc0eec62e70eead2d56d18e
-
SHA1
265fdf93c48297df800e6abe174e61478d788390
-
SHA256
39db680adbe401fd08e3fb972d5f9ed5818ea0005b68002658ade6a195bfd9ee
-
SHA512
e79a286cec37b502a53c68ad70c15870396bb999a4e68d297ca28516eecd560e2efbc0e49aba8349fc0ba7919ec4957115315e45c28aee7e5df55acdea3812d9
-
SSDEEP
12288:/MrXy90sSzOTE0ipeGi+G2Amkg3Sac3ghWk/htAJ5OjkR/l0lLTWeuvGkBoynM8f:QyaOAY+G2pkKgghHLUOjkRKLhuukKyMy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-