General
-
Target
b7aa8fbb068f5f35771a7fb0ca8f9eb8489ab585b5df75fcca4f2d05af1cb2da
-
Size
2.4MB
-
Sample
221101-m188hsbba8
-
MD5
6ba26c8c9d0b49743978898777e69407
-
SHA1
c1b0379502fc6fe3e253a6c844cd3fc4c32f0ac3
-
SHA256
b7aa8fbb068f5f35771a7fb0ca8f9eb8489ab585b5df75fcca4f2d05af1cb2da
-
SHA512
f67987e22694edf238064789af6b853a4570b512a5ce8a8b3db159c046fddaa2a13bc6262350b90ad1d8952bcd45d44572f4fcc80bcca8e3933a11597f320d81
-
SSDEEP
24576:xWS6ROzt3DY/YcN2bR+MJtsFXljk5xmCZ9tUyKoKo58ti3WxL3Esl3RuQ55313T:0ROztOaIs8ti3Wxbl3p
Static task
static1
Behavioral task
behavioral1
Sample
b7aa8fbb068f5f35771a7fb0ca8f9eb8489ab585b5df75fcca4f2d05af1cb2da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7aa8fbb068f5f35771a7fb0ca8f9eb8489ab585b5df75fcca4f2d05af1cb2da.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
193.124.22.4:39946
-
auth_value
5016fa3a4a8a2db473d7221f59d05a31
Targets
-
-
Target
b7aa8fbb068f5f35771a7fb0ca8f9eb8489ab585b5df75fcca4f2d05af1cb2da
-
Size
2.4MB
-
MD5
6ba26c8c9d0b49743978898777e69407
-
SHA1
c1b0379502fc6fe3e253a6c844cd3fc4c32f0ac3
-
SHA256
b7aa8fbb068f5f35771a7fb0ca8f9eb8489ab585b5df75fcca4f2d05af1cb2da
-
SHA512
f67987e22694edf238064789af6b853a4570b512a5ce8a8b3db159c046fddaa2a13bc6262350b90ad1d8952bcd45d44572f4fcc80bcca8e3933a11597f320d81
-
SSDEEP
24576:xWS6ROzt3DY/YcN2bR+MJtsFXljk5xmCZ9tUyKoKo58ti3WxL3Esl3RuQ55313T:0ROztOaIs8ti3Wxbl3p
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-