General
-
Target
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a
-
Size
725KB
-
Sample
221029-yry7qsdfcp
-
MD5
e17ea9a5a3a77e8448ab1d777c86ba18
-
SHA1
6c4f7b37e8b46d52f7f3dabfe3ea90aa9022c72e
-
SHA256
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a
-
SHA512
bd4f28ec8b43722f2ed6a23236bee418b28d8713c6343dd74bd88698aff6bf6f66afadd448373b4f5007461c17bdd948d699aa31f5249e1a824d445da9b57d84
-
SSDEEP
12288:ESW8QlniHAXIFEuCbgucz1EaUEikA5EicgZLv0OROZnvtgHuVkuyUxW7rHPPM/o5:ESW8QBKAXIFEuqmcEizr0OROCr/HM
Static task
static1
Behavioral task
behavioral1
Sample
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Targets
-
-
Target
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a
-
Size
725KB
-
MD5
e17ea9a5a3a77e8448ab1d777c86ba18
-
SHA1
6c4f7b37e8b46d52f7f3dabfe3ea90aa9022c72e
-
SHA256
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a
-
SHA512
bd4f28ec8b43722f2ed6a23236bee418b28d8713c6343dd74bd88698aff6bf6f66afadd448373b4f5007461c17bdd948d699aa31f5249e1a824d445da9b57d84
-
SSDEEP
12288:ESW8QlniHAXIFEuCbgucz1EaUEikA5EicgZLv0OROZnvtgHuVkuyUxW7rHPPM/o5:ESW8QBKAXIFEuqmcEizr0OROCr/HM
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-