General
-
Target
05046a5abb7522d5839de7fc774ca23486cb8cfc9d1ccdeb0357b44171353a5d
-
Size
399KB
-
Sample
221225-ysbstsfb7v
-
MD5
89be4ac8a06eefdd3939ef7c949d2eaa
-
SHA1
3fe3f325bf7743fe859a67b426d94cd574333b2e
-
SHA256
05046a5abb7522d5839de7fc774ca23486cb8cfc9d1ccdeb0357b44171353a5d
-
SHA512
e56ecdfa4516b916116a4b167eb9b26f641afd6d4a6fbac4cdcb23d1d6fa3d707f425eef912e4fea91e10b4e8821ddb7c11b183fb83efb60dd87bdc84a0fbf6f
-
SSDEEP
6144:M6DCxLT52vMishn5u9OC9ZjYAONrgjpibxmcIhLl02nh6VhyDN:M6DCxLT52vMiy73rgjpcmn0KRN
Static task
static1
Behavioral task
behavioral1
Sample
05046a5abb7522d5839de7fc774ca23486cb8cfc9d1ccdeb0357b44171353a5d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Targets
-
-
Target
05046a5abb7522d5839de7fc774ca23486cb8cfc9d1ccdeb0357b44171353a5d
-
Size
399KB
-
MD5
89be4ac8a06eefdd3939ef7c949d2eaa
-
SHA1
3fe3f325bf7743fe859a67b426d94cd574333b2e
-
SHA256
05046a5abb7522d5839de7fc774ca23486cb8cfc9d1ccdeb0357b44171353a5d
-
SHA512
e56ecdfa4516b916116a4b167eb9b26f641afd6d4a6fbac4cdcb23d1d6fa3d707f425eef912e4fea91e10b4e8821ddb7c11b183fb83efb60dd87bdc84a0fbf6f
-
SSDEEP
6144:M6DCxLT52vMishn5u9OC9ZjYAONrgjpibxmcIhLl02nh6VhyDN:M6DCxLT52vMiy73rgjpcmn0KRN
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation