General
-
Target
6f21b4ff6f79d6840250022594cb0174acb4619f206ecd68be8ae818b3b78182
-
Size
146KB
-
Sample
221208-x84ywabb44
-
MD5
6acdcad05ac4a9e9fd48d92cfce1d545
-
SHA1
c983cf3f70d5e267c242ebb62095c3bfb512e9d1
-
SHA256
c576cfbfd68954eec0afcbcd42497e0284f33a679e13577bb59867dbe34d5b33
-
SHA512
a1d73aabc832a212e804ae09f5bb9fea30594b9f65b84a9af98ddd3dee0c18000bb2c5e4fe2b38dd9eb9bebd3139e731a21ef20c13b0f89364ff1855a8310238
-
SSDEEP
3072:ju3vaYNbZ/Ww5xvVseSLftoQBy6Vo1KsA1C9PFmWcacV8yU:a/aYxMyxv/oFoZ1Awbcfmb
Static task
static1
Behavioral task
behavioral1
Sample
6f21b4ff6f79d6840250022594cb0174acb4619f206ecd68be8ae818b3b78182.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f21b4ff6f79d6840250022594cb0174acb4619f206ecd68be8ae818b3b78182.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
@P1
193.106.191.138:32796
-
auth_value
54c79ce081122137049ee07c0a2f38ab
Targets
-
-
Target
6f21b4ff6f79d6840250022594cb0174acb4619f206ecd68be8ae818b3b78182
-
Size
239KB
-
MD5
203a4339b5d63fd49e00cbcb831afbf0
-
SHA1
3001dcd39de4712b844046607689c2f6a10d229f
-
SHA256
6f21b4ff6f79d6840250022594cb0174acb4619f206ecd68be8ae818b3b78182
-
SHA512
83c30eba2b55a0f09c365662658e67afb843354e1d71748034d613c249ed3d9acba77fd1f293b1617d73621ba29840ce98f462f1a3cc82432625fdcd557a5281
-
SSDEEP
3072:+x+2gbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcbmJxO:+x+2gWg5Kq+PwQoHp0DoK2KJSTfqrhmq
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-