General
-
Target
15b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
-
Size
261KB
-
Sample
230320-bgflbaba35
-
MD5
3db6d94b8df4916aa7cb0d67f2bba3f6
-
SHA1
b27b508ce16462268b6a96a727007755fe62c8a1
-
SHA256
15b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
-
SHA512
47495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
SSDEEP
3072:UvmEID31U40ByUrwJ9Cfo25a1Ts0f1BiAHon3aLOoPTrXkVmPvFPtoHwKqZJxIxB:4m5lUF1wJ9CfoR1TsC1NwQ/emXFiHwKn
Static task
static1
Behavioral task
behavioral1
Sample
15b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
15b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
Rocket
95.217.188.21:7283
-
auth_value
0095203c91b01efccf3842dc176e53f2
Targets
-
-
Target
15b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
-
Size
261KB
-
MD5
3db6d94b8df4916aa7cb0d67f2bba3f6
-
SHA1
b27b508ce16462268b6a96a727007755fe62c8a1
-
SHA256
15b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
-
SHA512
47495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
SSDEEP
3072:UvmEID31U40ByUrwJ9Cfo25a1Ts0f1BiAHon3aLOoPTrXkVmPvFPtoHwKqZJxIxB:4m5lUF1wJ9CfoR1TsC1NwQ/emXFiHwKn
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-