General
-
Target
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778
-
Size
2.3MB
-
Sample
221029-ebphtabaer
-
MD5
40e711d3488dcc665a790ed0e59ad118
-
SHA1
9724a6fa4737ffb1696d83d35fd1cd0b3282464d
-
SHA256
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778
-
SHA512
759ebe33918d9721cbdeabe14d04014e676a2de029f068164ac178d7042974a1c660a2ad6c32e91f2f09d2821854201cafd14780996b6edbfaacf5e2c43fc5fd
-
SSDEEP
49152:xy0Ri/S6AJ9fcSPiVCTcQoY0uLTDkoanJFWm85ciCxWO5Om:xy0Ri/S6AJ9fcGiVEBBLTQnjpSCkir
Static task
static1
Behavioral task
behavioral1
Sample
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
1310
79.137.192.57:48771
-
auth_value
feb5f5c29913f32658637e553762a40e
Targets
-
-
Target
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778
-
Size
2.3MB
-
MD5
40e711d3488dcc665a790ed0e59ad118
-
SHA1
9724a6fa4737ffb1696d83d35fd1cd0b3282464d
-
SHA256
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778
-
SHA512
759ebe33918d9721cbdeabe14d04014e676a2de029f068164ac178d7042974a1c660a2ad6c32e91f2f09d2821854201cafd14780996b6edbfaacf5e2c43fc5fd
-
SSDEEP
49152:xy0Ri/S6AJ9fcSPiVCTcQoY0uLTDkoanJFWm85ciCxWO5Om:xy0Ri/S6AJ9fcGiVEBBLTQnjpSCkir
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-