General
-
Target
8cd709aad98ed6ec7b8375676d9c721ad8a4c243bd88c459553d784bf15c3601
-
Size
225KB
-
Sample
220910-n6fntsdgen
-
MD5
62303756f1df7dd1fcdb735fc8e0a38e
-
SHA1
0b47d111c41b2239bae09b4ff5e087ea16f26037
-
SHA256
8cd709aad98ed6ec7b8375676d9c721ad8a4c243bd88c459553d784bf15c3601
-
SHA512
dea51c2ee264fb4e44397e5027b380d3b4ac44bbeb618cd236f12ff2ee3451e8eacb025c16bc2d6b94107346572dd8baa20e816acbe8f9b7e82212d6f5850439
-
SSDEEP
3072:bp+hQFZeSur7tCqOe2BNdpH2DcJLMelnQpNNQMOLOH4NjUxVdOX:4hQSSuvV2x3JLllnQpNy8VdOX
Static task
static1
Behavioral task
behavioral1
Sample
8cd709aad98ed6ec7b8375676d9c721ad8a4c243bd88c459553d784bf15c3601.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
1337
78.153.144.6:2510
-
auth_value
b0447922bcbc2eda83260a9e7a638f45
Targets
-
-
Target
8cd709aad98ed6ec7b8375676d9c721ad8a4c243bd88c459553d784bf15c3601
-
Size
225KB
-
MD5
62303756f1df7dd1fcdb735fc8e0a38e
-
SHA1
0b47d111c41b2239bae09b4ff5e087ea16f26037
-
SHA256
8cd709aad98ed6ec7b8375676d9c721ad8a4c243bd88c459553d784bf15c3601
-
SHA512
dea51c2ee264fb4e44397e5027b380d3b4ac44bbeb618cd236f12ff2ee3451e8eacb025c16bc2d6b94107346572dd8baa20e816acbe8f9b7e82212d6f5850439
-
SSDEEP
3072:bp+hQFZeSur7tCqOe2BNdpH2DcJLMelnQpNNQMOLOH4NjUxVdOX:4hQSSuvV2x3JLllnQpNy8VdOX
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-