General
-
Target
5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852
-
Size
725KB
-
Sample
221029-abeldsdcdp
-
MD5
fd75bb4e9bcd522db40ae5b640eab481
-
SHA1
50a99237eed19b01f3a3a1973c588ce25242d64b
-
SHA256
5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852
-
SHA512
f66d4b393454951df7ab3ce083433f7ddafce145931a3d56d2ff2eafff323d5cd1bbf68f41b0e17aeba67e924db4c2b80366c995aecb25c9bf47ba9b498c7d33
-
SSDEEP
12288:2yqWCLJ7rGM0rkwIU/g2Nyz/DJVHEiuhNoKpGJ082AG9rt6VOuKUsSQwiYbDMAv6:2jWCLgM0rkwIbZEikNrpGJN2XzMiqLE
Static task
static1
Behavioral task
behavioral1
Sample
5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Targets
-
-
Target
5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852
-
Size
725KB
-
MD5
fd75bb4e9bcd522db40ae5b640eab481
-
SHA1
50a99237eed19b01f3a3a1973c588ce25242d64b
-
SHA256
5d9cb5b8673a4e038bda3dd58be5dbf2dc6ceb0bc3a3a0d37be5887fcd18e852
-
SHA512
f66d4b393454951df7ab3ce083433f7ddafce145931a3d56d2ff2eafff323d5cd1bbf68f41b0e17aeba67e924db4c2b80366c995aecb25c9bf47ba9b498c7d33
-
SSDEEP
12288:2yqWCLJ7rGM0rkwIU/g2Nyz/DJVHEiuhNoKpGJ082AG9rt6VOuKUsSQwiYbDMAv6:2jWCLgM0rkwIbZEikNrpGJN2XzMiqLE
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-