General
-
Target
omar (1).exe
-
Size
1.2MB
-
Sample
210524-vffh12qqle
-
MD5
13db34cab435d9858269c5e823f4b575
-
SHA1
c6e9c301d3cfaf6671490c47c1ed4eb59f343f21
-
SHA256
63ca5cde7141ae503639f3022f4dc4a244e8b19bf320d55a9567789aa632d036
-
SHA512
dfd36c39b35cf1aed2b76e38d4a08c41792611cf886d337d129a19c963878cc53fb7a0d71e078d2d38e61d8341a938869686f62673f080a7182020cd08c2c6a8
Static task
static1
Behavioral task
behavioral1
Sample
omar (1).exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
omar (1).exe
Resource
win10v20210410
Malware Config
Extracted
redline
omar
217.12.209.28:44444
Targets
-
-
Target
omar (1).exe
-
Size
1.2MB
-
MD5
13db34cab435d9858269c5e823f4b575
-
SHA1
c6e9c301d3cfaf6671490c47c1ed4eb59f343f21
-
SHA256
63ca5cde7141ae503639f3022f4dc4a244e8b19bf320d55a9567789aa632d036
-
SHA512
dfd36c39b35cf1aed2b76e38d4a08c41792611cf886d337d129a19c963878cc53fb7a0d71e078d2d38e61d8341a938869686f62673f080a7182020cd08c2c6a8
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Suspicious use of SetThreadContext
-