General
-
Target
4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c
-
Size
258KB
-
Sample
230321-17nr2sdd65
-
MD5
3e9823524640a692dedcf6a876f7f26a
-
SHA1
823de6267a9a514be190b270694d6d8eadbf806c
-
SHA256
4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c
-
SHA512
e00f764929feb2485dc51d899b341e318bec854bfccc3b588865458a951dc9e3131a0a2b132a5f51bb474537887c9d7d4c9edb6e140fb7a9aaa437ace88fa0a8
-
SSDEEP
3072:uaHM3QnAMZy10biCL5qM1+Sqwi+KlWJ2NtbH52bxa0tpbVR/CGJnJsT7R6HqZNRa:IAnW0bJqM1+STN2WJEHUdHprFiG7
Static task
static1
Behavioral task
behavioral1
Sample
4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
135.181.173.163:4323
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Targets
-
-
Target
4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c
-
Size
258KB
-
MD5
3e9823524640a692dedcf6a876f7f26a
-
SHA1
823de6267a9a514be190b270694d6d8eadbf806c
-
SHA256
4eb16db797dd2cf85157ac90345295f3f9e932bd9dcf1ac0200aef245f3edc2c
-
SHA512
e00f764929feb2485dc51d899b341e318bec854bfccc3b588865458a951dc9e3131a0a2b132a5f51bb474537887c9d7d4c9edb6e140fb7a9aaa437ace88fa0a8
-
SSDEEP
3072:uaHM3QnAMZy10biCL5qM1+Sqwi+KlWJ2NtbH52bxa0tpbVR/CGJnJsT7R6HqZNRa:IAnW0bJqM1+STN2WJEHUdHprFiG7
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-