General
-
Target
0ba193df984d3da6993e7a0b84561adca005c7f2c7c2155d3defb07618ef7740
-
Size
2.5MB
-
Sample
221102-n4yrmacdbq
-
MD5
1b426b8e9942376e03543222863d29ae
-
SHA1
efaa1061619b6c82489db46a45d6b99a4c2ef2b2
-
SHA256
0ba193df984d3da6993e7a0b84561adca005c7f2c7c2155d3defb07618ef7740
-
SHA512
73c30d9d21f1206f383c08b0a2b6a432839592b3954cb602daaefc7a865c63860cb139ddc92a1a8c50103d78b9089972fc8edd6c082d455b90c5476a9d22d3ea
-
SSDEEP
49152:5ZqUuXj4r5Du2GIz+rgMw5obPxjDo27t+pszaId/FSKzNeU25jsN+NA:5QU04VqIz+rgxEPxjHzaI5FSK4Dg8u
Static task
static1
Behavioral task
behavioral1
Sample
0ba193df984d3da6993e7a0b84561adca005c7f2c7c2155d3defb07618ef7740.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
1310
79.137.192.57:48771
-
auth_value
feb5f5c29913f32658637e553762a40e
Targets
-
-
Target
0ba193df984d3da6993e7a0b84561adca005c7f2c7c2155d3defb07618ef7740
-
Size
2.5MB
-
MD5
1b426b8e9942376e03543222863d29ae
-
SHA1
efaa1061619b6c82489db46a45d6b99a4c2ef2b2
-
SHA256
0ba193df984d3da6993e7a0b84561adca005c7f2c7c2155d3defb07618ef7740
-
SHA512
73c30d9d21f1206f383c08b0a2b6a432839592b3954cb602daaefc7a865c63860cb139ddc92a1a8c50103d78b9089972fc8edd6c082d455b90c5476a9d22d3ea
-
SSDEEP
49152:5ZqUuXj4r5Du2GIz+rgMw5obPxjDo27t+pszaId/FSKzNeU25jsN+NA:5QU04VqIz+rgxEPxjHzaI5FSK4Dg8u
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-