General
-
Target
da0baba4a78ada89b12bb09154ce8845.exe
-
Size
594KB
-
Sample
201228-pygjayv3ts
-
MD5
da0baba4a78ada89b12bb09154ce8845
-
SHA1
3093fb1feace2a89311923c283083e61ef47cde8
-
SHA256
c96f35457cc26c36104f053cb445c0835ead6434c3ce57adaae7911b2ab51d5c
-
SHA512
932709db0d24285e220253bbb0262322dbd567fc77888541a0664d1604eae3221017471c0b401be1196a3fd428c03d28153a2a41cf89482465485ab93d8ae527
Static task
static1
Behavioral task
behavioral1
Sample
da0baba4a78ada89b12bb09154ce8845.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
da0baba4a78ada89b12bb09154ce8845.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
da0baba4a78ada89b12bb09154ce8845.exe
-
Size
594KB
-
MD5
da0baba4a78ada89b12bb09154ce8845
-
SHA1
3093fb1feace2a89311923c283083e61ef47cde8
-
SHA256
c96f35457cc26c36104f053cb445c0835ead6434c3ce57adaae7911b2ab51d5c
-
SHA512
932709db0d24285e220253bbb0262322dbd567fc77888541a0664d1604eae3221017471c0b401be1196a3fd428c03d28153a2a41cf89482465485ab93d8ae527
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-