General
-
Target
788-318-0x0000000000F40000-0x0000000001277000-memory.dmp
-
Size
3.2MB
-
Sample
220924-b2sflsach2
-
MD5
b1cdc4e1b3c3f0e2176c68906f37cf9b
-
SHA1
7b5c58936be53752f35ff2d60f610b7fb38dffff
-
SHA256
f29b6a224067827dd9ee643933b4375021306ec0fbdb2c96d3b1099c81f15bf3
-
SHA512
cf6cf7783539f818aaca5d6249765dac4f36683241bcfcad6e927ad448e251b80000bfa0716e3d4dbe718cd52f1a7a1a63ff4b2cc548ab1c873c4de6cc06cfe5
-
SSDEEP
24576:7+szVTIkKC0p8qZsWq24tityGjvd5cNud1XRaeOx:a6tIt8qZsWq2hBJ5JdC
Behavioral task
behavioral1
Sample
788-318-0x0000000000F40000-0x0000000001277000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
788-318-0x0000000000F40000-0x0000000001277000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
newall
deyneyab.xyz:80
-
auth_value
25db96cfa370a37f57d1a769f3900122
Targets
-
-
Target
788-318-0x0000000000F40000-0x0000000001277000-memory.dmp
-
Size
3.2MB
-
MD5
b1cdc4e1b3c3f0e2176c68906f37cf9b
-
SHA1
7b5c58936be53752f35ff2d60f610b7fb38dffff
-
SHA256
f29b6a224067827dd9ee643933b4375021306ec0fbdb2c96d3b1099c81f15bf3
-
SHA512
cf6cf7783539f818aaca5d6249765dac4f36683241bcfcad6e927ad448e251b80000bfa0716e3d4dbe718cd52f1a7a1a63ff4b2cc548ab1c873c4de6cc06cfe5
-
SSDEEP
24576:7+szVTIkKC0p8qZsWq24tityGjvd5cNud1XRaeOx:a6tIt8qZsWq2hBJ5JdC
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-