General
-
Target
d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd
-
Size
1.1MB
-
Sample
230414-17m6hsdf6s
-
MD5
e94aeb4f076d831aa78fe9c14ab7af02
-
SHA1
0acd0a16f8208b243ae5b6b02b116eb8094d5752
-
SHA256
d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd
-
SHA512
aae40bf3c0082fe096742cbc6d5ded475c6240357d3ab79d97793168c8a30dc5f6b7f21c8fb09a64d8d9fc2a409334b5d72fd74b53c60ba3471fb3a9f70d9d6c
-
SSDEEP
6144:X2ZTmVLrIcqBUAOJcULhQl/JkQBWes8JFTxa4HpzJJ/:XmmVvVkULS/2Q08JFHpv/
Static task
static1
Behavioral task
behavioral1
Sample
d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
135.181.241.192:4327
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Targets
-
-
Target
d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd
-
Size
1.1MB
-
MD5
e94aeb4f076d831aa78fe9c14ab7af02
-
SHA1
0acd0a16f8208b243ae5b6b02b116eb8094d5752
-
SHA256
d99d9eb6a45f7f2b4cceda51e816726dfe199aea8d3b9e4b1090074f036cffdd
-
SHA512
aae40bf3c0082fe096742cbc6d5ded475c6240357d3ab79d97793168c8a30dc5f6b7f21c8fb09a64d8d9fc2a409334b5d72fd74b53c60ba3471fb3a9f70d9d6c
-
SSDEEP
6144:X2ZTmVLrIcqBUAOJcULhQl/JkQBWes8JFTxa4HpzJJ/:XmmVvVkULS/2Q08JFHpv/
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-