General
-
Target
1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382
-
Size
939KB
-
Sample
231012-df242abf91
-
MD5
ddde984215a9550b3cc4b4c6a036258b
-
SHA1
838527773b48a4fd51361bbbfc7f3eff9b4192cb
-
SHA256
1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382
-
SHA512
942383402e02de5da902e33dd5431f1c76e639a62f2c309149fe55191f095fc47ed73b47f89b696f33aa901c2faea463a353b2e1b66fe637b2f492b7be450ed3
-
SSDEEP
24576:gy0cVwNhHt0nwwtIgIPnoam9jbV7BN6cfEvnJ0RAFQ4Mm/yRkm:n0EwNeIxvlmJbNB8cf6mR2JyR
Static task
static1
Behavioral task
behavioral1
Sample
1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382
-
Size
939KB
-
MD5
ddde984215a9550b3cc4b4c6a036258b
-
SHA1
838527773b48a4fd51361bbbfc7f3eff9b4192cb
-
SHA256
1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382
-
SHA512
942383402e02de5da902e33dd5431f1c76e639a62f2c309149fe55191f095fc47ed73b47f89b696f33aa901c2faea463a353b2e1b66fe637b2f492b7be450ed3
-
SSDEEP
24576:gy0cVwNhHt0nwwtIgIPnoam9jbV7BN6cfEvnJ0RAFQ4Mm/yRkm:n0EwNeIxvlmJbNB8cf6mR2JyR
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-