General
-
Target
bc87eea0f094e03dc9ab5a65d04cbb5b4fc336369fef297f26258e4bf4b8cc7e
-
Size
1.0MB
-
Sample
231012-g19ldsbh2v
-
MD5
56035c1ee270ef20089fc18d49d2542d
-
SHA1
b8fb79a55c66b1754f9d3ec123b1d932f88d7049
-
SHA256
bc87eea0f094e03dc9ab5a65d04cbb5b4fc336369fef297f26258e4bf4b8cc7e
-
SHA512
0fb2154471d4a22e47d4380a6b76518a5a63ccae038d5f17ed36be81e85eb2fe87338fc2ee2da4fac34fad503483f449fcb5f2ddb0d9e274d5b2d9b6727dee99
-
SSDEEP
24576:NyBIm+J0jSP+a3jl+YC0M0pNaPSMHVcj6gVhxxLzx:oOeq+azl+YpPcKG6xNz
Static task
static1
Behavioral task
behavioral1
Sample
bc87eea0f094e03dc9ab5a65d04cbb5b4fc336369fef297f26258e4bf4b8cc7e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bc87eea0f094e03dc9ab5a65d04cbb5b4fc336369fef297f26258e4bf4b8cc7e.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
bc87eea0f094e03dc9ab5a65d04cbb5b4fc336369fef297f26258e4bf4b8cc7e
-
Size
1.0MB
-
MD5
56035c1ee270ef20089fc18d49d2542d
-
SHA1
b8fb79a55c66b1754f9d3ec123b1d932f88d7049
-
SHA256
bc87eea0f094e03dc9ab5a65d04cbb5b4fc336369fef297f26258e4bf4b8cc7e
-
SHA512
0fb2154471d4a22e47d4380a6b76518a5a63ccae038d5f17ed36be81e85eb2fe87338fc2ee2da4fac34fad503483f449fcb5f2ddb0d9e274d5b2d9b6727dee99
-
SSDEEP
24576:NyBIm+J0jSP+a3jl+YC0M0pNaPSMHVcj6gVhxxLzx:oOeq+azl+YpPcKG6xNz
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-