General
-
Target
5c142b90c5ff7c0b9b2201dbdaa53a444b09f702828bb0bcebdb0d7cba2a4fb6
-
Size
201KB
-
Sample
221201-vh2dyshg46
-
MD5
5a789c0da9517b7a2c187e38512e01ef
-
SHA1
1ee6a3b159a248d952cec6f72ae98a2bfc362c76
-
SHA256
5c142b90c5ff7c0b9b2201dbdaa53a444b09f702828bb0bcebdb0d7cba2a4fb6
-
SHA512
4f144135bae821f684daa29397eae00b69248940877992c0d41f9e9c6a8b04a6b2603ffc62c7636e0b0a4d8bc9f14e334c079af9c48489cd5ca6ae946bd6a558
-
SSDEEP
3072:OFEnPaejyHmxkHieLXgVMh07XnS/sJIDp0qQjU7hvhYTW/uAVRum68AxVgxO:OqnPMGAiWXg3rSaIVgjUFiW/uvTVD
Static task
static1
Behavioral task
behavioral1
Sample
5c142b90c5ff7c0b9b2201dbdaa53a444b09f702828bb0bcebdb0d7cba2a4fb6.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
@P1
193.106.191.138:32796
-
auth_value
54c79ce081122137049ee07c0a2f38ab
Targets
-
-
Target
5c142b90c5ff7c0b9b2201dbdaa53a444b09f702828bb0bcebdb0d7cba2a4fb6
-
Size
201KB
-
MD5
5a789c0da9517b7a2c187e38512e01ef
-
SHA1
1ee6a3b159a248d952cec6f72ae98a2bfc362c76
-
SHA256
5c142b90c5ff7c0b9b2201dbdaa53a444b09f702828bb0bcebdb0d7cba2a4fb6
-
SHA512
4f144135bae821f684daa29397eae00b69248940877992c0d41f9e9c6a8b04a6b2603ffc62c7636e0b0a4d8bc9f14e334c079af9c48489cd5ca6ae946bd6a558
-
SSDEEP
3072:OFEnPaejyHmxkHieLXgVMh07XnS/sJIDp0qQjU7hvhYTW/uAVRum68AxVgxO:OqnPMGAiWXg3rSaIVgjUFiW/uvTVD
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-