General
-
Target
19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445
-
Size
341KB
-
Sample
221026-elm3qsefgq
-
MD5
7f459661d0481e49a3cacabc7dd1479f
-
SHA1
589e481cc2ff221609843ac70f6cfd0672a4dbb7
-
SHA256
19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445
-
SHA512
742669780885c6fb9bcdc79ab9eb1f47c9b74f8e352c627a53c1de0e3d1d4d4b5671aec66f403d2de9225e315892d42c15cf17b308bf57c38cd25df3142a3a24
-
SSDEEP
6144:j2x/5p4oZflvsjew3f+vW5FLUKMAO9kfeM8dCD/DPDhRIQ4NJTd:Op4oZflvB0vM5FCHPDi7d
Static task
static1
Behavioral task
behavioral1
Sample
19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Targets
-
-
Target
19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445
-
Size
341KB
-
MD5
7f459661d0481e49a3cacabc7dd1479f
-
SHA1
589e481cc2ff221609843ac70f6cfd0672a4dbb7
-
SHA256
19fb910f5fa56a28cee8758ef56e874a09e36998a389b553be9d527c3ec46445
-
SHA512
742669780885c6fb9bcdc79ab9eb1f47c9b74f8e352c627a53c1de0e3d1d4d4b5671aec66f403d2de9225e315892d42c15cf17b308bf57c38cd25df3142a3a24
-
SSDEEP
6144:j2x/5p4oZflvsjew3f+vW5FLUKMAO9kfeM8dCD/DPDhRIQ4NJTd:Op4oZflvB0vM5FCHPDi7d
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-