General
-
Target
db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2
-
Size
138KB
-
Sample
221205-r6kjkadd31
-
MD5
a7cabb3adf4a82ad242e0cf77488568f
-
SHA1
e25e2e68b02c7211d885db289414d16b9c914daf
-
SHA256
8a0b9dfcc98c253cdc1e2d4624998da564191dfea9bda32544fea846e1bcc3c8
-
SHA512
6d2e91316b0c5fbb70053ee3ce3d8556923f2149a7b20280f879eaebbab9b2c1c3f2d9c5b9336cf3652545a608184ca6b5b1b9f9b06acf254be1e98a26d8ec8d
-
SSDEEP
3072:kxo5C6CW0rgtz/cBKwboUOrfHj1KdmTCLXaYkQn2E8/M2ivx:co5Cs0u/clvOLGmTCLOQnuoZ
Static task
static1
Behavioral task
behavioral1
Sample
db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
@P1
193.106.191.138:32796
-
auth_value
54c79ce081122137049ee07c0a2f38ab
Targets
-
-
Target
db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2
-
Size
217KB
-
MD5
21bee8d6428f46a7dcc0e7bfbdacfb60
-
SHA1
cabd4498b70ac810190db2fcaa8cbf509095d844
-
SHA256
db103d9c83e01b198667c00e68aa612f0054bda86ea24ea9d2c41b2f57a658e2
-
SHA512
089581fc39553328b3c3734fd8bb0673e2de6125ffc134f4efec745eb18f2896b13602b758e81189c27e6d7a38da3c92b12b923f617bc1dad81fd84d8aff4012
-
SSDEEP
3072:3liRuiFzW0qu7b4ee8fwmGzPMWxS+bsqLCX3knb95IcWdXCY9bTAIrFldi0cEIxO:3liRuwNveMwTDM4RVCkbSCY9fQEL
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-