General
-
Target
30757d645e25fb8ee4871ceface19772.exe
-
Size
2.4MB
-
Sample
221102-xgbs1sdedm
-
MD5
30757d645e25fb8ee4871ceface19772
-
SHA1
e21abb5ecefd8f9c9ad5f30c27ef3de913b47ed2
-
SHA256
53a346abbdc2c926034a024aee8a4b794edb4430826489486ad0dc46d1352d41
-
SHA512
226f96d3d36e70788a9b2019331fd29cbabfad994c31f3fda09d02304b246638caabf5623e66e870e3f9077f170286fa9cf4693f266be3a1dd17dc130f2378df
-
SSDEEP
49152:lIgOhjpeuUTmDyXv2KT0MIrCHvn9MJ7Im7uAYHsJd0ChzzI7MVHvwWjNM:lIgOhjpeuUTmDKvG4viGm6qdU0HFNM
Static task
static1
Behavioral task
behavioral1
Sample
30757d645e25fb8ee4871ceface19772.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30757d645e25fb8ee4871ceface19772.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
Testiruemlnk
195.2.79.103:29071
-
auth_value
cb1bbd476d42e2e79ff5d2349388d6ae
Targets
-
-
Target
30757d645e25fb8ee4871ceface19772.exe
-
Size
2.4MB
-
MD5
30757d645e25fb8ee4871ceface19772
-
SHA1
e21abb5ecefd8f9c9ad5f30c27ef3de913b47ed2
-
SHA256
53a346abbdc2c926034a024aee8a4b794edb4430826489486ad0dc46d1352d41
-
SHA512
226f96d3d36e70788a9b2019331fd29cbabfad994c31f3fda09d02304b246638caabf5623e66e870e3f9077f170286fa9cf4693f266be3a1dd17dc130f2378df
-
SSDEEP
49152:lIgOhjpeuUTmDyXv2KT0MIrCHvn9MJ7Im7uAYHsJd0ChzzI7MVHvwWjNM:lIgOhjpeuUTmDKvG4viGm6qdU0HFNM
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-