General
-
Target
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a
-
Size
928KB
-
Sample
231011-3bzwjsbd7y
-
MD5
237f0453ec09669ea06948d3d012bca9
-
SHA1
b57668880ac7bb91fa0a45dde4a6793ae3cde767
-
SHA256
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a
-
SHA512
7a9022858544cee136bf701fca463a85055a92c9f26116596e364f25cb2197fa3d5fda114ba7420592afe3c24929615815857bae2b8f2442d53040b51f7403e7
-
SSDEEP
12288:dMr6y90rv/kDDwTOIHJcm+vHGvI3igXQnFlr/D63z5ASw32jhGm/QD8F2O316uoV:Ty+2DwTLHOm+uvsQzGDC3ou8FImUD
Static task
static1
Behavioral task
behavioral1
Sample
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a
-
Size
928KB
-
MD5
237f0453ec09669ea06948d3d012bca9
-
SHA1
b57668880ac7bb91fa0a45dde4a6793ae3cde767
-
SHA256
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a
-
SHA512
7a9022858544cee136bf701fca463a85055a92c9f26116596e364f25cb2197fa3d5fda114ba7420592afe3c24929615815857bae2b8f2442d53040b51f7403e7
-
SSDEEP
12288:dMr6y90rv/kDDwTOIHJcm+vHGvI3igXQnFlr/D63z5ASw32jhGm/QD8F2O316uoV:Ty+2DwTLHOm+uvsQzGDC3ou8FImUD
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-