General
-
Target
redline_stage_2.exe
-
Size
3.2MB
-
Sample
220920-mxjhpacgg4
-
MD5
cb256a45f5ea76e960224e587bd339bd
-
SHA1
4861d0ac38f7a3072e2552576aca1ccb4b5a182c
-
SHA256
6af5a56deb5139e66b9a344c40861a633b32b5cefbb120355bb3f3f207007cbb
-
SHA512
ebb1d1e951d8660d44e800a2933fbddb0009be148afd25bb4266ea1c7ad576f4d4343da65eef00b63530e7e42c05acdc7360423749e343d55470d590e210b862
-
SSDEEP
49152:ojXRjNYpHz+x1DruxTDUCzXWnUcvgvNgFmaQhSD+eE02bSiN6lQi67QeklF:KXvYperWnUCzmUc4V0N1nrc74F
Behavioral task
behavioral1
Sample
redline_stage_2.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
GD
49.51.90.156:32323
-
auth_value
216b4a613d722869714e5beaeac54def
Targets
-
-
Target
redline_stage_2.exe
-
Size
3.2MB
-
MD5
cb256a45f5ea76e960224e587bd339bd
-
SHA1
4861d0ac38f7a3072e2552576aca1ccb4b5a182c
-
SHA256
6af5a56deb5139e66b9a344c40861a633b32b5cefbb120355bb3f3f207007cbb
-
SHA512
ebb1d1e951d8660d44e800a2933fbddb0009be148afd25bb4266ea1c7ad576f4d4343da65eef00b63530e7e42c05acdc7360423749e343d55470d590e210b862
-
SSDEEP
49152:ojXRjNYpHz+x1DruxTDUCzXWnUcvgvNgFmaQhSD+eE02bSiN6lQi67QeklF:KXvYperWnUCzmUc4V0N1nrc74F
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-