General
-
Target
74ae0102c4050421d0c81c0e96627b39f2004e2456845a43cdf6280c06f4ee64
-
Size
472KB
-
Sample
221107-tz3snsabal
-
MD5
4f784fd650c865f8363b7f314c20f4be
-
SHA1
b1f016318068a4c59960254ca7560cfba550cd5c
-
SHA256
74ae0102c4050421d0c81c0e96627b39f2004e2456845a43cdf6280c06f4ee64
-
SHA512
c5abcd28932273def39c57210ef266b7a83898d9c02e3597c9d5a62e193acdafd0efce983c8ace838982110451276c63a3267d9569e08f6855da3d75b2acaec0
-
SSDEEP
12288:S9s1Nb4P/ngZepriWeB7Ix0nV654ve3ySYX0vO+5N42FeVxCNm1arFSB+:BLsP/nuoaICV654ve3ySYX0vO+5N42FF
Static task
static1
Behavioral task
behavioral1
Sample
74ae0102c4050421d0c81c0e96627b39f2004e2456845a43cdf6280c06f4ee64.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
157.90.145.151:14075
-
auth_value
197a8d2e248bee4495c3db7cbfdf6d3d
Targets
-
-
Target
74ae0102c4050421d0c81c0e96627b39f2004e2456845a43cdf6280c06f4ee64
-
Size
472KB
-
MD5
4f784fd650c865f8363b7f314c20f4be
-
SHA1
b1f016318068a4c59960254ca7560cfba550cd5c
-
SHA256
74ae0102c4050421d0c81c0e96627b39f2004e2456845a43cdf6280c06f4ee64
-
SHA512
c5abcd28932273def39c57210ef266b7a83898d9c02e3597c9d5a62e193acdafd0efce983c8ace838982110451276c63a3267d9569e08f6855da3d75b2acaec0
-
SSDEEP
12288:S9s1Nb4P/ngZepriWeB7Ix0nV654ve3ySYX0vO+5N42FeVxCNm1arFSB+:BLsP/nuoaICV654ve3ySYX0vO+5N42FF
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-