General
-
Target
19c737468617d72846231cfa493dda10ed4b24ecf8f284481c8aa59c61f3db3d
-
Size
217KB
-
Sample
221123-z1kldaec26
-
MD5
1526f0914cf84e722a061833d97aa16e
-
SHA1
ce92e068d54635ac27a9723393c34b0b371d59cb
-
SHA256
19c737468617d72846231cfa493dda10ed4b24ecf8f284481c8aa59c61f3db3d
-
SHA512
49f6ed9f18b724d3cebf5ee7432a1382932c43dde6ab06b5e8aee1f0223239b63e53567b7d4a5cb59b2b3c443981ad4ab477a1e4a0249be3076af35baee88d4a
-
SSDEEP
3072:SU44v790Lox+J4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwVS:SUTvZ0Loqwe2xrjq6O4MJ4bM5Y4+cE
Static task
static1
Behavioral task
behavioral1
Sample
19c737468617d72846231cfa493dda10ed4b24ecf8f284481c8aa59c61f3db3d.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
@madboyza
193.106.191.138:32796
-
auth_value
9bfce7bfb110f8f53d96c7a32c655358
Targets
-
-
Target
19c737468617d72846231cfa493dda10ed4b24ecf8f284481c8aa59c61f3db3d
-
Size
217KB
-
MD5
1526f0914cf84e722a061833d97aa16e
-
SHA1
ce92e068d54635ac27a9723393c34b0b371d59cb
-
SHA256
19c737468617d72846231cfa493dda10ed4b24ecf8f284481c8aa59c61f3db3d
-
SHA512
49f6ed9f18b724d3cebf5ee7432a1382932c43dde6ab06b5e8aee1f0223239b63e53567b7d4a5cb59b2b3c443981ad4ab477a1e4a0249be3076af35baee88d4a
-
SSDEEP
3072:SU44v790Lox+J4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwVS:SUTvZ0Loqwe2xrjq6O4MJ4bM5Y4+cE
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-