General
-
Target
5f1db0848f07c7fe96bdef23f3eb075c9c307b22b3de70c5747663a8a2d72f72
-
Size
2.4MB
-
Sample
221101-ll7wgaadb9
-
MD5
4c7ee10f0ec055e6555930228ed7dbbb
-
SHA1
ecaefd5b6d8ff0d0c8ae71243e6239a5fe282fda
-
SHA256
5f1db0848f07c7fe96bdef23f3eb075c9c307b22b3de70c5747663a8a2d72f72
-
SHA512
e7602e67c08017b174800cde95d7eba94b662d65ccfa7793fb9ed0658a6e24c4cd3d51702b1c31e18139861d3e5258bed19c9b3a86e68e10c78dba5afaa02f61
-
SSDEEP
24576:hC3fgsYcYIFrbY8MhUlKlBx9SJB5NHm2qO5k/ywi1Lc/mLiSWV9wXYNa/HBl3Ruy:UfRQSn5w+wi1Lc/mKGBl33
Static task
static1
Behavioral task
behavioral1
Sample
5f1db0848f07c7fe96bdef23f3eb075c9c307b22b3de70c5747663a8a2d72f72.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5f1db0848f07c7fe96bdef23f3eb075c9c307b22b3de70c5747663a8a2d72f72.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
@seregafreak
185.106.92.226:40788
-
auth_value
dda97cbed95c760a7517b9592c0e27be
Targets
-
-
Target
5f1db0848f07c7fe96bdef23f3eb075c9c307b22b3de70c5747663a8a2d72f72
-
Size
2.4MB
-
MD5
4c7ee10f0ec055e6555930228ed7dbbb
-
SHA1
ecaefd5b6d8ff0d0c8ae71243e6239a5fe282fda
-
SHA256
5f1db0848f07c7fe96bdef23f3eb075c9c307b22b3de70c5747663a8a2d72f72
-
SHA512
e7602e67c08017b174800cde95d7eba94b662d65ccfa7793fb9ed0658a6e24c4cd3d51702b1c31e18139861d3e5258bed19c9b3a86e68e10c78dba5afaa02f61
-
SSDEEP
24576:hC3fgsYcYIFrbY8MhUlKlBx9SJB5NHm2qO5k/ywi1Lc/mLiSWV9wXYNa/HBl3Ruy:UfRQSn5w+wi1Lc/mKGBl33
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-