General
-
Target
8add5d1645ea263b53dc91f19727f098ac0f1fb1bc5923e77754b87374ceef3a
-
Size
1.0MB
-
Sample
230528-gq87waed45
-
MD5
0b28d6de6e29a658a9df0f03c0d71134
-
SHA1
616a34a57a6a240bf8ebe213c09900d8dc410234
-
SHA256
8add5d1645ea263b53dc91f19727f098ac0f1fb1bc5923e77754b87374ceef3a
-
SHA512
b6f2ce84a1f7956c60cf8fd16f3e24b18be4e1fc7be85e26d849e18670ffaa68d6824d8d5f5aa2bbfdf1fb3f410622e25f4c4dec44e2466517e49a118d7e2d5c
-
SSDEEP
24576:6yh8571909DEtikk6gsh4XW/PlVsnkxvL/:BhSI94Ykk7XWXUkx
Static task
static1
Behavioral task
behavioral1
Sample
8add5d1645ea263b53dc91f19727f098ac0f1fb1bc5923e77754b87374ceef3a.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
lura
83.97.73.127:19062
-
auth_value
a32643486616d3c1378d2ef55bc4a5af
Extracted
redline
heroy
83.97.73.127:19062
-
auth_value
b2879468e50d2d36e66f1a067d4a8bb3
Targets
-
-
Target
8add5d1645ea263b53dc91f19727f098ac0f1fb1bc5923e77754b87374ceef3a
-
Size
1.0MB
-
MD5
0b28d6de6e29a658a9df0f03c0d71134
-
SHA1
616a34a57a6a240bf8ebe213c09900d8dc410234
-
SHA256
8add5d1645ea263b53dc91f19727f098ac0f1fb1bc5923e77754b87374ceef3a
-
SHA512
b6f2ce84a1f7956c60cf8fd16f3e24b18be4e1fc7be85e26d849e18670ffaa68d6824d8d5f5aa2bbfdf1fb3f410622e25f4c4dec44e2466517e49a118d7e2d5c
-
SSDEEP
24576:6yh8571909DEtikk6gsh4XW/PlVsnkxvL/:BhSI94Ykk7XWXUkx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-