General
-
Target
file.exe
-
Size
217KB
-
Sample
221123-l6smaadc33
-
MD5
8660ca63f8ec767ffbc5ed561569a59b
-
SHA1
681fabcd63d6a982f6a86e44bd04fad943979b0b
-
SHA256
65bd762c2dd45d442278e1403bb99a14106699d1f74060333693439c189adb87
-
SHA512
b61200487783285578d2598b97c80ea545a5750f11e4ffb58c82fe4394c3265d88c4e2563f8299693c43aabf5a582c8626cbbfd8bf35a699f109ed1da71a4c34
-
SSDEEP
3072:ZO4vs90noT7U4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwZS:ZxvS0noUwe2xrjq6O4MJ4bM5Y4+cE
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
@madboyza
193.106.191.138:32796
-
auth_value
9bfce7bfb110f8f53d96c7a32c655358
Targets
-
-
Target
file.exe
-
Size
217KB
-
MD5
8660ca63f8ec767ffbc5ed561569a59b
-
SHA1
681fabcd63d6a982f6a86e44bd04fad943979b0b
-
SHA256
65bd762c2dd45d442278e1403bb99a14106699d1f74060333693439c189adb87
-
SHA512
b61200487783285578d2598b97c80ea545a5750f11e4ffb58c82fe4394c3265d88c4e2563f8299693c43aabf5a582c8626cbbfd8bf35a699f109ed1da71a4c34
-
SSDEEP
3072:ZO4vs90noT7U4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwZS:ZxvS0noUwe2xrjq6O4MJ4bM5Y4+cE
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-