General
-
Target
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0
-
Size
700KB
-
Sample
230327-t43y8sec77
-
MD5
960e70f2fc9f1d96d9fff7112204cf19
-
SHA1
d9b37954335e38fc380400ba2c556bce907c7eab
-
SHA256
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0
-
SHA512
c4edfbeafd93e9505359da380a436c9d6e871ee6ec901f6ccf3f6bef52cee69df7ba34cdc0f2577c0a0cadae92b3b83f882b5b8ed650f63957d49a82132f468c
-
SSDEEP
12288:fMr2y90krjXZk3T5oLZFr+pa4unSO7X20afJBRvZKAjOGy:py3fQ5c88z7ifJFOD
Static task
static1
Behavioral task
behavioral1
Sample
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Targets
-
-
Target
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0
-
Size
700KB
-
MD5
960e70f2fc9f1d96d9fff7112204cf19
-
SHA1
d9b37954335e38fc380400ba2c556bce907c7eab
-
SHA256
cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0
-
SHA512
c4edfbeafd93e9505359da380a436c9d6e871ee6ec901f6ccf3f6bef52cee69df7ba34cdc0f2577c0a0cadae92b3b83f882b5b8ed650f63957d49a82132f468c
-
SSDEEP
12288:fMr2y90krjXZk3T5oLZFr+pa4unSO7X20afJBRvZKAjOGy:py3fQ5c88z7ifJFOD
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-