General
-
Target
d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255
-
Size
403KB
-
Sample
221226-jxg33sfg51
-
MD5
9997129d3e41ae79381957203470b051
-
SHA1
96dedfa4c05585d8d957a80a6dc816424fc60308
-
SHA256
d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255
-
SHA512
2e1664c8bab30869775ef59a53cc29ae418866a4974ce9a8014b0918694eb10bdd7d76646156d6b731057e897846d8f70c86f0fe4581d72117a4d08a4e61788b
-
SSDEEP
6144:hHNZ37xo0++Wa/Jcupbq4C4a/bn0AON8r4nxNkvlLD8AKtE7al1z/Sta:hHf7xo0++Wa/JXvCGSv1YCm1mE
Static task
static1
Behavioral task
behavioral1
Sample
d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
11
79.137.202.18:45218
-
auth_value
107e09eee63158d2488feb03dac75204
Targets
-
-
Target
d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255
-
Size
403KB
-
MD5
9997129d3e41ae79381957203470b051
-
SHA1
96dedfa4c05585d8d957a80a6dc816424fc60308
-
SHA256
d5ee046c945c2742f492c96a01eed8a4d92c3cc3f7d1d3c45c12e9162ec08255
-
SHA512
2e1664c8bab30869775ef59a53cc29ae418866a4974ce9a8014b0918694eb10bdd7d76646156d6b731057e897846d8f70c86f0fe4581d72117a4d08a4e61788b
-
SSDEEP
6144:hHNZ37xo0++Wa/Jcupbq4C4a/bn0AON8r4nxNkvlLD8AKtE7al1z/Sta:hHf7xo0++Wa/JXvCGSv1YCm1mE
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation