General
-
Target
dfdb88f7ac585ae75c3a476bf3a61bb2841e2b693ebc43cfe2d6b6e482186279
-
Size
2.4MB
-
Sample
221101-nn32eacddp
-
MD5
30988473755f98f3fc449d74b62ee192
-
SHA1
6888c6039adfcac4517c348867e8ebd2b865db5e
-
SHA256
dfdb88f7ac585ae75c3a476bf3a61bb2841e2b693ebc43cfe2d6b6e482186279
-
SHA512
f6f2fb811d4ac0fa200db4b1784580d90200e328b48cbece9fc5a997d4db629afd089a34c09f38809e1d212552da3db2b526d92dbab61d9a969f981d77a27efb
-
SSDEEP
24576:nwC75Y6YG8fCUSMY5oXDrZ6Shem0shsskPFhA/jeRbaM6FPLQEDl3RuQ55313Y:nwCJul/hsLNCLe9aMAP1l3+
Static task
static1
Behavioral task
behavioral1
Sample
dfdb88f7ac585ae75c3a476bf3a61bb2841e2b693ebc43cfe2d6b6e482186279.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfdb88f7ac585ae75c3a476bf3a61bb2841e2b693ebc43cfe2d6b6e482186279.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
@lovelopfy
185.106.92.226:40788
-
auth_value
bfdb82ba515e153efb45d9a22230c5b9
Targets
-
-
Target
dfdb88f7ac585ae75c3a476bf3a61bb2841e2b693ebc43cfe2d6b6e482186279
-
Size
2.4MB
-
MD5
30988473755f98f3fc449d74b62ee192
-
SHA1
6888c6039adfcac4517c348867e8ebd2b865db5e
-
SHA256
dfdb88f7ac585ae75c3a476bf3a61bb2841e2b693ebc43cfe2d6b6e482186279
-
SHA512
f6f2fb811d4ac0fa200db4b1784580d90200e328b48cbece9fc5a997d4db629afd089a34c09f38809e1d212552da3db2b526d92dbab61d9a969f981d77a27efb
-
SSDEEP
24576:nwC75Y6YG8fCUSMY5oXDrZ6Shem0shsskPFhA/jeRbaM6FPLQEDl3RuQ55313Y:nwCJul/hsLNCLe9aMAP1l3+
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-