General
-
Target
083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029
-
Size
954KB
-
Sample
231011-1agmgaea7x
-
MD5
39dc08b0f43bf5446344aef849e1796f
-
SHA1
0403612818b2fa92d0ef66a0b82addfe841f6832
-
SHA256
083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029
-
SHA512
c8fa9a940ed47becdafeb498e69c5375196e45338cb4f65d9b528b417a80a86f305394d4b8b41dd8b9cfaea084ee05090bfa0ec68cab52425bc841e61154a4fc
-
SSDEEP
12288:YMrhy90WRhjyxm2rF4l43sKTtZzabfJwE1BgOlMg7wlw7lZ9hXWDQa79XPbBedyE:Zyj90au3hdCwsmOl7war9hXva75PbxE
Static task
static1
Behavioral task
behavioral1
Sample
083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029
-
Size
954KB
-
MD5
39dc08b0f43bf5446344aef849e1796f
-
SHA1
0403612818b2fa92d0ef66a0b82addfe841f6832
-
SHA256
083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029
-
SHA512
c8fa9a940ed47becdafeb498e69c5375196e45338cb4f65d9b528b417a80a86f305394d4b8b41dd8b9cfaea084ee05090bfa0ec68cab52425bc841e61154a4fc
-
SSDEEP
12288:YMrhy90WRhjyxm2rF4l43sKTtZzabfJwE1BgOlMg7wlw7lZ9hXWDQa79XPbBedyE:Zyj90au3hdCwsmOl7war9hXva75PbxE
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-