General
-
Target
73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5
-
Size
113KB
-
Sample
221123-zfejmafg8z
-
MD5
cfb12db0d6b37db0c4fa46a465a7f990
-
SHA1
883c0c1a32158f557be43638be21f45df17f0d45
-
SHA256
e40634e7ee65750dadf7ca200624e668bd7533bea25c815d4d10d67531752008
-
SHA512
307337c5943a7f5593ee68763f00a2e31fbab10fb2bbe413f00165424a1b5c3c86824fff8a42eff6197884aac5158496d594f82f61b293f1dec94a1a43975714
-
SSDEEP
3072:fgKQDb1OcJHH6hY+Z4Tftllb6Gc4uergQ:50OoHHk/Mftrb6GpmQ
Static task
static1
Behavioral task
behavioral1
Sample
73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
@madboyza
193.106.191.138:32796
-
auth_value
9bfce7bfb110f8f53d96c7a32c655358
Targets
-
-
Target
73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5
-
Size
217KB
-
MD5
6426198b2789f1d5974088367162a5da
-
SHA1
2f39387f1821e7487cd3a946a3f592d7b98943a0
-
SHA256
73112b71da11771029b84791c5ff3440fe1634d78d5e8fa62d75f05f1a76dbc5
-
SHA512
f6d042b4c5772b257021b1b1bdd636867d3617b78e0c64f86fea83f1101fa14514348108a79f9b4360913b7c6027d2ef46449fa4758bf4b3b758f8e1ff66bf9c
-
SSDEEP
3072:eA4v790Lox+J4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwVS:e7vZ0Loqwe2xrjq6O4MJ4bM5Y4+cE
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-