General
-
Target
505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1
-
Size
399KB
-
Sample
221225-nq66vabd92
-
MD5
0ea45bddb097b50c089bea5ae3f5a6fd
-
SHA1
4a9755d1e363803087d8f2c77d2c3cc5804196e2
-
SHA256
505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1
-
SHA512
f70607e01a2b8fa2d60f54cace041ed12a3610d94f4e30f84b5b7cc7b48ae1c7725eb8aa69ea2aa5d3261bd772d239a7792c7817a0aac46e3e5702cb0184aad5
-
SSDEEP
6144:p6DCxLT52vMishn5u9OC9ZjYAOkuXFGvNCy7QRO8GjTKXe/kXDN:p6DCxLT52vMiy7yuVfRO/TWN
Static task
static1
Behavioral task
behavioral1
Sample
505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Targets
-
-
Target
505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1
-
Size
399KB
-
MD5
0ea45bddb097b50c089bea5ae3f5a6fd
-
SHA1
4a9755d1e363803087d8f2c77d2c3cc5804196e2
-
SHA256
505509de0eccbd99559118cc90f42f5618c68827d963394afdef810c7fc3b2f1
-
SHA512
f70607e01a2b8fa2d60f54cace041ed12a3610d94f4e30f84b5b7cc7b48ae1c7725eb8aa69ea2aa5d3261bd772d239a7792c7817a0aac46e3e5702cb0184aad5
-
SSDEEP
6144:p6DCxLT52vMishn5u9OC9ZjYAOkuXFGvNCy7QRO8GjTKXe/kXDN:p6DCxLT52vMiy7yuVfRO/TWN
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-