General
-
Target
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f
-
Size
1.0MB
-
Sample
231012-he5kzsee32
-
MD5
4974f00ab78a24cc927bebd02e889e1c
-
SHA1
aef336f55e3a99c2a9f06fad2ce86917a325a187
-
SHA256
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f
-
SHA512
79ec05228e97ab6b8cb7ef66c0c70ac2869f81d29128b6b6312d870006728841c27db98655f40252bf624a1ff65b54b6f4e5a9cfb674911af4c7e8f2703bffd7
-
SSDEEP
24576:uyt1Qe5Ee8zTEEWPpLv/hMZ6auCL0hXJkMN1u:9t1l58zVENpmpuCL0H
Static task
static1
Behavioral task
behavioral1
Sample
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f
-
Size
1.0MB
-
MD5
4974f00ab78a24cc927bebd02e889e1c
-
SHA1
aef336f55e3a99c2a9f06fad2ce86917a325a187
-
SHA256
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f
-
SHA512
79ec05228e97ab6b8cb7ef66c0c70ac2869f81d29128b6b6312d870006728841c27db98655f40252bf624a1ff65b54b6f4e5a9cfb674911af4c7e8f2703bffd7
-
SSDEEP
24576:uyt1Qe5Ee8zTEEWPpLv/hMZ6auCL0hXJkMN1u:9t1l58zVENpmpuCL0H
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-