General
-
Target
f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb
-
Size
289KB
-
Sample
230309-18fstscb9z
-
MD5
bc34fa73d188d1f45b0a1f69ae3a5383
-
SHA1
1e931ce12326a7cef1fc5b2ba429400c4752fd6c
-
SHA256
f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb
-
SHA512
b0ef89fe1e6bcead998e0d9a1677a56d221cad96a45b7e0e6f5035a5d0e27ccdc15275b725fbc9989a0d79fab3b960811960fe3a891a7e9d906fee16afec840b
-
SSDEEP
3072:lhKG/JfWnaql/8dHKnynw+DB4sJKyY9smD6qfuItVkC84C2KXTeE2tu2:lhv/9Y9/8dHrw+DB/r1QlfuLCKXTeE2J
Static task
static1
Behavioral task
behavioral1
Sample
f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
95.216.251.184:4321
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Targets
-
-
Target
f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb
-
Size
289KB
-
MD5
bc34fa73d188d1f45b0a1f69ae3a5383
-
SHA1
1e931ce12326a7cef1fc5b2ba429400c4752fd6c
-
SHA256
f3900ece43bc12daabcddc69c08989ab9b86a0f02e3128c57e54e83b896abceb
-
SHA512
b0ef89fe1e6bcead998e0d9a1677a56d221cad96a45b7e0e6f5035a5d0e27ccdc15275b725fbc9989a0d79fab3b960811960fe3a891a7e9d906fee16afec840b
-
SSDEEP
3072:lhKG/JfWnaql/8dHKnynw+DB4sJKyY9smD6qfuItVkC84C2KXTeE2tu2:lhv/9Y9/8dHrw+DB/r1QlfuLCKXTeE2J
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-