General
-
Target
be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6
-
Size
938KB
-
Sample
231012-d3k42aeh62
-
MD5
95a9952fc3b0f6dc60e827a235402f2c
-
SHA1
ed3d64ac753c8a3bc67f883833fae4f6c72f251f
-
SHA256
be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6
-
SHA512
f06ef467ab5de8b021d8dd3e194caa032a48893f0516fe9745f3298953b030e4eb5e57cb575f9850790eddedd6f7f744d32f803df50527e87cc8481c2b784903
-
SSDEEP
12288:ZMrqy903rObxYpP6o+XMTk5Nxu8Q+hW1Gavchieak8r2KqRiekI/srJtxJ18BCep:3yCr8mEo+cTQxu8Qzoa2uaKqjSJcR
Static task
static1
Behavioral task
behavioral1
Sample
be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6
-
Size
938KB
-
MD5
95a9952fc3b0f6dc60e827a235402f2c
-
SHA1
ed3d64ac753c8a3bc67f883833fae4f6c72f251f
-
SHA256
be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6
-
SHA512
f06ef467ab5de8b021d8dd3e194caa032a48893f0516fe9745f3298953b030e4eb5e57cb575f9850790eddedd6f7f744d32f803df50527e87cc8481c2b784903
-
SSDEEP
12288:ZMrqy903rObxYpP6o+XMTk5Nxu8Q+hW1Gavchieak8r2KqRiekI/srJtxJ18BCep:3yCr8mEo+cTQxu8Qzoa2uaKqjSJcR
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-