General
-
Target
940-125-0x0000000000E80000-0x0000000000EC4000-memory.dmp
-
Size
272KB
-
Sample
230328-b8xc5sab9y
-
MD5
6a23878816109fd0f37c1a8aec189ada
-
SHA1
4e0f533e9b3c17b2c1c9bbc8c50a1abc6962905b
-
SHA256
4856ed52e2c49ef3608699bc5b5d38e6d471245d5865dd4633fbd67e85ca9fe4
-
SHA512
6a7fe88e9eb5087721e9fe4aa765510459cb73a6aa9ebeaaeea8a60839939199089cca31d175d316fe646d7d638ca222670675125d9cc67d77bc2372e55e1d3d
-
SSDEEP
3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB
Behavioral task
behavioral1
Sample
940-125-0x0000000000E80000-0x0000000000EC4000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
940-125-0x0000000000E80000-0x0000000000EC4000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
940-125-0x0000000000E80000-0x0000000000EC4000-memory.dmp
-
Size
272KB
-
MD5
6a23878816109fd0f37c1a8aec189ada
-
SHA1
4e0f533e9b3c17b2c1c9bbc8c50a1abc6962905b
-
SHA256
4856ed52e2c49ef3608699bc5b5d38e6d471245d5865dd4633fbd67e85ca9fe4
-
SHA512
6a7fe88e9eb5087721e9fe4aa765510459cb73a6aa9ebeaaeea8a60839939199089cca31d175d316fe646d7d638ca222670675125d9cc67d77bc2372e55e1d3d
-
SSDEEP
3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-