General
-
Target
2f917c7224323ac3c9b7379d2876565adb9cf7b680c659c73158df8383e088b6
-
Size
389KB
-
Sample
221226-yrlawadg34
-
MD5
96899e6fa7dc6218295537f36a795b5d
-
SHA1
97a579c1238f27ef8e3282b2e0454c4afea48d37
-
SHA256
2f917c7224323ac3c9b7379d2876565adb9cf7b680c659c73158df8383e088b6
-
SHA512
9a8cfa7043df6a388b2db22d7a0780fdc59a788c4d8c07125a58e71f5116192eddac2229fefa43df0758ed120e49499ab1ed8b7776189df124ca090e92679401
-
SSDEEP
6144:8m4dxganzHlvVtNMGmHfuAKMpxSAOJ9M88/f2vT0ct8lP/4Ilbr9M:8tcanzHlvxMLShM88/fJctw/VlM
Static task
static1
Behavioral task
behavioral1
Sample
2f917c7224323ac3c9b7379d2876565adb9cf7b680c659c73158df8383e088b6.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
bunde2
65.21.5.58:24911
-
auth_value
fac6d788afc7ea9267b85bc08b54c40d
Targets
-
-
Target
2f917c7224323ac3c9b7379d2876565adb9cf7b680c659c73158df8383e088b6
-
Size
389KB
-
MD5
96899e6fa7dc6218295537f36a795b5d
-
SHA1
97a579c1238f27ef8e3282b2e0454c4afea48d37
-
SHA256
2f917c7224323ac3c9b7379d2876565adb9cf7b680c659c73158df8383e088b6
-
SHA512
9a8cfa7043df6a388b2db22d7a0780fdc59a788c4d8c07125a58e71f5116192eddac2229fefa43df0758ed120e49499ab1ed8b7776189df124ca090e92679401
-
SSDEEP
6144:8m4dxganzHlvVtNMGmHfuAKMpxSAOJ9M88/f2vT0ct8lP/4Ilbr9M:8tcanzHlvxMLShM88/fJctw/VlM
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-