General
-
Target
f78043064f0e16aea6e873598fe50a94361c399c3dc970400d158c7cf9b24120
-
Size
243KB
-
Sample
220212-ghl3dagfe4
-
MD5
ac3298d8cad2edef3a2591a277b79fb7
-
SHA1
c618ddf4c0fe50e7c4687962ca43d97eb8ede10b
-
SHA256
405cc3ad2ed6dc964ffe5f5900a4669b78fb74af2bcfa044c323926dc40ab4ad
-
SHA512
5e9949b32ec62b3411b38e3b73a67fc163c55d7434080c216c3b01580b579aedd17937e4567d338f89cff6dd7e103578c348784b2354b8578a730fdad5c707a5
Static task
static1
Behavioral task
behavioral1
Sample
f78043064f0e16aea6e873598fe50a94361c399c3dc970400d158c7cf9b24120.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f78043064f0e16aea6e873598fe50a94361c399c3dc970400d158c7cf9b24120.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
-
auth_value
44e87155dd7a4d1957a956ed040ff3fd
Targets
-
-
Target
f78043064f0e16aea6e873598fe50a94361c399c3dc970400d158c7cf9b24120
-
Size
375KB
-
MD5
288ddef9619ae09941218195a684616c
-
SHA1
4dc7d8f1121f0d9a29b3d600db342804c8dc89bb
-
SHA256
f78043064f0e16aea6e873598fe50a94361c399c3dc970400d158c7cf9b24120
-
SHA512
d472fcbc80ca8198d55f342b5130443c7f9e9e0105d4bf6a927ad2bec0da09317093160e2a64481cde175b60aa22b04ee9c4040e3d06263689dec758768637e5
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-