General
-
Target
f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42
-
Size
146KB
-
Sample
221205-y3l2jscf78
-
MD5
adf344467db38f1361b53761d73fa270
-
SHA1
215212a945550ed179734773a1e4227683fe3d65
-
SHA256
a7aba2db90b84d70d75e86732de6db991255fe23ed3c07ea07a5cf136138f053
-
SHA512
a795d8b5d43c044d4ad91e60e317440b9a622b7d94e95312916782882f961186b801a38f96061293a536f6242b4a63b09491c276a2a9b4239286dd85b21639fe
-
SSDEEP
3072:ZLZvaYNbZ/Ww5xvVseSLftoQBy6Vo1KsA8xtgpkIxx2iINF0SJz:lZaYxMyxv/oFoZ1jzGx0bF0Ez
Static task
static1
Behavioral task
behavioral1
Sample
f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
@P1
193.106.191.138:32796
-
auth_value
54c79ce081122137049ee07c0a2f38ab
Targets
-
-
Target
f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42
-
Size
239KB
-
MD5
a008c04a60729fffc6c7662d7a888d36
-
SHA1
c57e84fac1d7d53657566c200c66169597b310c5
-
SHA256
f02b076f1b3cd68340963e2a6bb556d256bd2772daa952b66df936cd3d005f42
-
SHA512
a7723ec0bc9c648c8552db951abfe4be657021fbf29773c6e40dca3c0d07ac071ceccd67e1553173233059c7ad2e4b3e7db03d913ccc4b8852a59839bdd2ef0c
-
SSDEEP
3072:9x+igbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcamXxO:9x+igWg5Kq+PwQoHp0DoK2KJSTfqrhm9
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-