General
-
Target
tmp
-
Size
6.4MB
-
Sample
230104-p23s8sff32
-
MD5
bfe6f8581cc2b03a87ff176b63e03cf0
-
SHA1
eb9e15d544af9ec823c5603c5ba7c1692f7e6194
-
SHA256
32a0b2435282952f78156d2ed8a459fbd2ae7b376a6b80430934d29cab3d33d8
-
SHA512
80204836e6ae810ba002c0c6a89c0d672435ab6a31002e9283e492053d43c4c06259eb2045c7cbd723119cd2a45857e0dbc179f35973f62da3c417c4419c0e07
-
SSDEEP
98304:5dn+cBiWwA2A5V5lqDS/XHt1o0tyGK5jCm+pZl+jRwOySBNmP9sDU9p4:50cILAlfvorGK5j7+pZIDt/ml2Us
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
Mastif_22
82.115.223.23:81
-
auth_value
33012a00e3806d4d63de65ff04b9746e
Targets
-
-
Target
tmp
-
Size
6.4MB
-
MD5
bfe6f8581cc2b03a87ff176b63e03cf0
-
SHA1
eb9e15d544af9ec823c5603c5ba7c1692f7e6194
-
SHA256
32a0b2435282952f78156d2ed8a459fbd2ae7b376a6b80430934d29cab3d33d8
-
SHA512
80204836e6ae810ba002c0c6a89c0d672435ab6a31002e9283e492053d43c4c06259eb2045c7cbd723119cd2a45857e0dbc179f35973f62da3c417c4419c0e07
-
SSDEEP
98304:5dn+cBiWwA2A5V5lqDS/XHt1o0tyGK5jCm+pZl+jRwOySBNmP9sDU9p4:50cILAlfvorGK5j7+pZIDt/ml2Us
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-