General
-
Target
New Section 1.one
-
Size
687KB
-
Sample
230330-j2y76adb8v
-
MD5
8ae07041e2b2c7201571f3b9541c3925
-
SHA1
f2c15ca4740fb2a1c11e8cd55181ba97caae3c77
-
SHA256
462bf8a2e19a3e2dd4e5635aa5089e7bdc291d5c5c4665549f64f67abf0b598a
-
SHA512
16643ff70f5b74a8516ad93625db110c6f04f29bb2fdc43009f1f77732e9a51b8d814872ff17598c3a014ebccf41aea396650f2a18a7cd69e83435443ba6e92d
-
SSDEEP
12288:CIjHiImv+fuHiMRLAlR88CQaAY3MjplVTK57xg/96LxY55W:DjH3+PiMRL98CkY3MrVqSs
Static task
static1
Behavioral task
behavioral1
Sample
New Section 1.one
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
New Section 1.one
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
kento
172.245.45.213:3235
-
auth_value
25782da22784dd4df09e2caa33275948
Targets
-
-
Target
New Section 1.one
-
Size
687KB
-
MD5
8ae07041e2b2c7201571f3b9541c3925
-
SHA1
f2c15ca4740fb2a1c11e8cd55181ba97caae3c77
-
SHA256
462bf8a2e19a3e2dd4e5635aa5089e7bdc291d5c5c4665549f64f67abf0b598a
-
SHA512
16643ff70f5b74a8516ad93625db110c6f04f29bb2fdc43009f1f77732e9a51b8d814872ff17598c3a014ebccf41aea396650f2a18a7cd69e83435443ba6e92d
-
SSDEEP
12288:CIjHiImv+fuHiMRLAlR88CQaAY3MjplVTK57xg/96LxY55W:DjH3+PiMRL98CkY3MrVqSs
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-