General
-
Target
7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46
-
Size
119KB
-
Sample
230102-xe6klsfc67
-
MD5
bbb33bb9e00d5e7ef58aab221947e918
-
SHA1
12e620f5b24b8911c8ee7ab2874bfd12355ebc59
-
SHA256
7465c7141dd27e19081342e2e184fbd93d4be7ac073264975543667fe5a0c3d8
-
SHA512
e094365e42099ce170d3e5277943eb5074238a4e8d3aefa9d14ad433de38cf1c41982ba292fa4107a5226c4ffbd4395c008049c4446410d4c016b8c934123eb2
-
SSDEEP
3072:RCKLe9hf9tnR0Kui+res/aQi7DkITyG9W5NxrXVfnoKc8aSo:wIe9hVbp+rxSQi7DDTvu/tPVo
Static task
static1
Behavioral task
behavioral1
Sample
7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
pub1
89.22.231.25:45245
-
auth_value
9c5c8480222ae57e3bcdac11c63a526d
Targets
-
-
Target
7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46
-
Size
277KB
-
MD5
f4f6384db371bd510205622328b608d2
-
SHA1
120fb865d34b4d3681457d34ca16bf1991e976d8
-
SHA256
7e68c21bc527a10d579636497f6acdcabc02d647adb44d130138280b0b2b3a46
-
SHA512
029acd8e5d3ab32a295ce253f48575b3e5d11ce957962c47b37ee2ae34e2027af7463cc253f270327201b85d3a72bbdf397c885fad81260c4545d70217683c4a
-
SSDEEP
6144:NiSAGT+Z6EDT6ezC3pR6EIdOm2WaWeRuWO5WOmujl7KCE1eCVUBXV8qUX:NiSAGT+ZY3eEIdOm2WaWeRuWO5WOmulm
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-