General
-
Target
1920-149-0x0000000002300000-0x0000000002344000-memory.dmp
-
Size
272KB
-
Sample
230327-vppzhaed87
-
MD5
2f0479d21adb216f681b6388cc202f54
-
SHA1
aa0e9832d41ab5932a52dd5d2ef182f331f26cf2
-
SHA256
f25c8679496d5d81f8f187057cd57af012511b892391115d97ae876feba7ff3a
-
SHA512
1416623f06fdaeac08f9f5582e98c343f3c14772902d35a3be800199bbc278dd4921f427e5d3959b3305ab32f81c8976bd95527e69ad2c126047e04aa50951f7
-
SSDEEP
3072:Q6jIELf6FDTCjhnTzO6w/et1WuDCvgxo40TnCch36nycRt7fwxNn2pU9f2MKTV/C:Q6jocuVe3W8Y2chqnycP
Behavioral task
behavioral1
Sample
1920-149-0x0000000002300000-0x0000000002344000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1920-149-0x0000000002300000-0x0000000002344000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Targets
-
-
Target
1920-149-0x0000000002300000-0x0000000002344000-memory.dmp
-
Size
272KB
-
MD5
2f0479d21adb216f681b6388cc202f54
-
SHA1
aa0e9832d41ab5932a52dd5d2ef182f331f26cf2
-
SHA256
f25c8679496d5d81f8f187057cd57af012511b892391115d97ae876feba7ff3a
-
SHA512
1416623f06fdaeac08f9f5582e98c343f3c14772902d35a3be800199bbc278dd4921f427e5d3959b3305ab32f81c8976bd95527e69ad2c126047e04aa50951f7
-
SSDEEP
3072:Q6jIELf6FDTCjhnTzO6w/et1WuDCvgxo40TnCch36nycRt7fwxNn2pU9f2MKTV/C:Q6jocuVe3W8Y2chqnycP
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-