General
-
Target
a6f73c0be8f29e793a5c08370807cb9a715de35f647712dc600d733203b6e376
-
Size
753KB
-
Sample
230530-drd7cafc4t
-
MD5
1df8588032b505af0d63b5afdb5cb82c
-
SHA1
d5dfc08062e756fce1d65222dd8454924efba2b2
-
SHA256
a6f73c0be8f29e793a5c08370807cb9a715de35f647712dc600d733203b6e376
-
SHA512
78f7779b344c144ef63c257b6d20f16afba941e54f5440cb2747f992152a5e5acbae4976ecba3e83bf7f589caf804a71395740477a992af95041e1076a997c73
-
SSDEEP
12288:QMrpy90uuc7s2dcbQUb4KYzig/AR4A2VjPZPfFhhXQ/b02wy8BUbLAXBu4z7N:pyOn6c8eRSvA2VjZf202wtBLVzp
Static task
static1
Behavioral task
behavioral1
Sample
a6f73c0be8f29e793a5c08370807cb9a715de35f647712dc600d733203b6e376.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
diza
83.97.73.127:19045
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Targets
-
-
Target
a6f73c0be8f29e793a5c08370807cb9a715de35f647712dc600d733203b6e376
-
Size
753KB
-
MD5
1df8588032b505af0d63b5afdb5cb82c
-
SHA1
d5dfc08062e756fce1d65222dd8454924efba2b2
-
SHA256
a6f73c0be8f29e793a5c08370807cb9a715de35f647712dc600d733203b6e376
-
SHA512
78f7779b344c144ef63c257b6d20f16afba941e54f5440cb2747f992152a5e5acbae4976ecba3e83bf7f589caf804a71395740477a992af95041e1076a997c73
-
SSDEEP
12288:QMrpy90uuc7s2dcbQUb4KYzig/AR4A2VjPZPfFhhXQ/b02wy8BUbLAXBu4z7N:pyOn6c8eRSvA2VjZf202wtBLVzp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-