General
-
Target
fae95404497faf9030e074edd30643cf7be0463930133dd5854dda24953c29fc
-
Size
955KB
-
Sample
231012-e4pdhsha77
-
MD5
46b04882b80ff2f56d70aaf728ab9f20
-
SHA1
b2d15133f3c90952dc029908e445ae44e4b860cc
-
SHA256
fae95404497faf9030e074edd30643cf7be0463930133dd5854dda24953c29fc
-
SHA512
3da63854224e19f14e81645c0831fa9b9335b9d68e4ab025c5523253c85f27a874b1aba524e828e55dbad65cdd9627a95d5c434114eb86cfea0cb6c5a427531d
-
SSDEEP
24576:MyzC5tECcHiu7+rOE8nHitkT+BnUsw/o+tg+y:76ERpK6RHitkIwwA
Static task
static1
Behavioral task
behavioral1
Sample
fae95404497faf9030e074edd30643cf7be0463930133dd5854dda24953c29fc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fae95404497faf9030e074edd30643cf7be0463930133dd5854dda24953c29fc.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
fae95404497faf9030e074edd30643cf7be0463930133dd5854dda24953c29fc
-
Size
955KB
-
MD5
46b04882b80ff2f56d70aaf728ab9f20
-
SHA1
b2d15133f3c90952dc029908e445ae44e4b860cc
-
SHA256
fae95404497faf9030e074edd30643cf7be0463930133dd5854dda24953c29fc
-
SHA512
3da63854224e19f14e81645c0831fa9b9335b9d68e4ab025c5523253c85f27a874b1aba524e828e55dbad65cdd9627a95d5c434114eb86cfea0cb6c5a427531d
-
SSDEEP
24576:MyzC5tECcHiu7+rOE8nHitkT+BnUsw/o+tg+y:76ERpK6RHitkIwwA
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-