General
-
Target
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9
-
Size
54KB
-
Sample
220623-rdspgagba4
-
MD5
bf3f098255fe2c23b9135409652e72c2
-
SHA1
a8ec905d04c72ec2fa4099fafa2fc29caa8749a7
-
SHA256
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9
-
SHA512
67dee018ca82b424d6607f79a2978a2727d08b1ca0495b6099eb2b493d5981d7b9c98d8adeba10272208ea7136339d239733b997636554179dda6771cf3fa9ee
Static task
static1
Behavioral task
behavioral1
Sample
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9.exe
Resource
win10-20220414-en
Malware Config
Extracted
redline
kista
65.108.27.131:45256
-
auth_value
4573bf97dc6f0f5ec522dbf1c8c7410e
Targets
-
-
Target
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9
-
Size
54KB
-
MD5
bf3f098255fe2c23b9135409652e72c2
-
SHA1
a8ec905d04c72ec2fa4099fafa2fc29caa8749a7
-
SHA256
5f410355e3101d5a4e7abab50397539dbd383eb8c6dbfa6635978fa72f4825b9
-
SHA512
67dee018ca82b424d6607f79a2978a2727d08b1ca0495b6099eb2b493d5981d7b9c98d8adeba10272208ea7136339d239733b997636554179dda6771cf3fa9ee
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-