General
-
Target
fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a
-
Size
723KB
-
Sample
221024-tgwxeaheg2
-
MD5
d420769874e19f6f02fe22507b392c8b
-
SHA1
e88fbd7db111fc7f13247b1ba1240587bccf7f7f
-
SHA256
fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a
-
SHA512
86e4812b9ef01fceecddaeca3b6c3c73ce774e3cd44164dd7abd960d2946246b2fd26e65334920c4405dcfbad450a6dfcdb51a2cde3a00cb7d2c6c17181f491e
-
SSDEEP
12288:CQfr2Y0TpkxujvEBBmUQEI2yEiThYvTEGJ0wJ69TV6VBuKU64ZgM+WLgm:CQfrT0TpkxuI2EidYbEGJdaVDCWz
Static task
static1
Behavioral task
behavioral1
Sample
fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
slovarikinstalls
78.153.144.3:2510
-
auth_value
5f80b2ec82e3bd02a08a3a55d3180551
Targets
-
-
Target
fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a
-
Size
723KB
-
MD5
d420769874e19f6f02fe22507b392c8b
-
SHA1
e88fbd7db111fc7f13247b1ba1240587bccf7f7f
-
SHA256
fd0169e1672962cc4e814501e2ad393653244b085042e25e783dd67e25163b8a
-
SHA512
86e4812b9ef01fceecddaeca3b6c3c73ce774e3cd44164dd7abd960d2946246b2fd26e65334920c4405dcfbad450a6dfcdb51a2cde3a00cb7d2c6c17181f491e
-
SSDEEP
12288:CQfr2Y0TpkxujvEBBmUQEI2yEiThYvTEGJ0wJ69TV6VBuKU64ZgM+WLgm:CQfrT0TpkxuI2EidYbEGJdaVDCWz
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-