General
-
Target
8bb15fa045c03ba626b91f478aa0b7837f39a9aa038033ef91f0908b02e3907a
-
Size
3.9MB
-
Sample
230628-aecwzagg5y
-
MD5
41e5f3911c46752507403696acd2d0b6
-
SHA1
c48236c710cdab9e656bcbbb04b4316aa906de7a
-
SHA256
8bb15fa045c03ba626b91f478aa0b7837f39a9aa038033ef91f0908b02e3907a
-
SHA512
a6c6e8bcc898a47dbb8851d756ec17072ff5a8dd1a8661ab658fb1ca90ad3c3dd4a1220eae1f642e78ef9a06ec4f0b3e4c7f12ec3ce3a2d38f63ba4a67a4d846
-
SSDEEP
49152:cl4puSoH1bY9OE5fzrl/AgMXvyiIPcZ2c1TWMp1MwIxNTtKtWahLZ3OC:kSoH1blE5fzrygmy9kZ2GDp10JIRZ3d
Static task
static1
Behavioral task
behavioral1
Sample
8bb15fa045c03ba626b91f478aa0b7837f39a9aa038033ef91f0908b02e3907a.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
8bb15fa045c03ba626b91f478aa0b7837f39a9aa038033ef91f0908b02e3907a.exe
Resource
win10-20230621-en
Malware Config
Extracted
redline
smoke
83.97.73.131:19071
-
auth_value
aaa47198b84c95fcce9397339e8af9d4
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Targets
-
-
Target
8bb15fa045c03ba626b91f478aa0b7837f39a9aa038033ef91f0908b02e3907a
-
Size
3.9MB
-
MD5
41e5f3911c46752507403696acd2d0b6
-
SHA1
c48236c710cdab9e656bcbbb04b4316aa906de7a
-
SHA256
8bb15fa045c03ba626b91f478aa0b7837f39a9aa038033ef91f0908b02e3907a
-
SHA512
a6c6e8bcc898a47dbb8851d756ec17072ff5a8dd1a8661ab658fb1ca90ad3c3dd4a1220eae1f642e78ef9a06ec4f0b3e4c7f12ec3ce3a2d38f63ba4a67a4d846
-
SSDEEP
49152:cl4puSoH1bY9OE5fzrl/AgMXvyiIPcZ2c1TWMp1MwIxNTtKtWahLZ3OC:kSoH1blE5fzrygmy9kZ2GDp10JIRZ3d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-