General
-
Target
fe6482fcf407ade5bf653ebd463ce0ee314e8c4dd4e5a8f24b0687d7dc41c4e0
-
Size
780KB
-
Sample
230528-p2efmsfe61
-
MD5
a0b6a90f0f807c588e14624ecdc0f71e
-
SHA1
925b6da8ead3df53a545457a542ba63cb70a787f
-
SHA256
fe6482fcf407ade5bf653ebd463ce0ee314e8c4dd4e5a8f24b0687d7dc41c4e0
-
SHA512
10f91e5d4814374f4f73659ea32fe67daad2b3700f85d24104ccf176f41506c8773a127f9f2352c9255f53d8d2c6d60df5355531482e0df5671d65d3b693eb4e
-
SSDEEP
24576:DyFePKhKcTiZ4vjJT7jML4l5KFxgwKMaWlPC:WFeP+tTiZgjJHwEke
Static task
static1
Behavioral task
behavioral1
Sample
fe6482fcf407ade5bf653ebd463ce0ee314e8c4dd4e5a8f24b0687d7dc41c4e0.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
daswa
83.97.73.127:19062
-
auth_value
a6ab6b8df5480a0bb295d3c069f67bf8
Extracted
redline
mirko
83.97.73.127:19062
-
auth_value
35111a095377107ec8b7d3e035831af8
Targets
-
-
Target
fe6482fcf407ade5bf653ebd463ce0ee314e8c4dd4e5a8f24b0687d7dc41c4e0
-
Size
780KB
-
MD5
a0b6a90f0f807c588e14624ecdc0f71e
-
SHA1
925b6da8ead3df53a545457a542ba63cb70a787f
-
SHA256
fe6482fcf407ade5bf653ebd463ce0ee314e8c4dd4e5a8f24b0687d7dc41c4e0
-
SHA512
10f91e5d4814374f4f73659ea32fe67daad2b3700f85d24104ccf176f41506c8773a127f9f2352c9255f53d8d2c6d60df5355531482e0df5671d65d3b693eb4e
-
SSDEEP
24576:DyFePKhKcTiZ4vjJT7jML4l5KFxgwKMaWlPC:WFeP+tTiZgjJHwEke
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-