General
-
Target
a3cr.exe
-
Size
270KB
-
Sample
230513-2qjmfahe97
-
MD5
bf4629546843ffc88d9406ed6bc2d5fd
-
SHA1
77d0095513b6fe0cc8de5388492b6aa2ea871929
-
SHA256
53158a43ca64a068cb70e9cdfa74e763c459ea7d806dbcecd27780144a3820aa
-
SHA512
82432dd221a9aa8ecb052fbc14d1d8e61f9bd4de2c11984dedb08fa3603eaa6146deebfd4248aa845c9bbb4f6ba3ab6da902a100688a416cc25debc289706b9a
-
SSDEEP
6144:EMVDs/VZ7lvRllqa+ZksyZXt5zoDqaUBZG/j:lts/tvLQc5zwXwG/j
Static task
static1
Behavioral task
behavioral1
Sample
a3cr.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a3cr.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
a3
65.21.133.231:47430
-
auth_value
6171b64699d91ea058ba94185cb8acbb
Targets
-
-
Target
a3cr.exe
-
Size
270KB
-
MD5
bf4629546843ffc88d9406ed6bc2d5fd
-
SHA1
77d0095513b6fe0cc8de5388492b6aa2ea871929
-
SHA256
53158a43ca64a068cb70e9cdfa74e763c459ea7d806dbcecd27780144a3820aa
-
SHA512
82432dd221a9aa8ecb052fbc14d1d8e61f9bd4de2c11984dedb08fa3603eaa6146deebfd4248aa845c9bbb4f6ba3ab6da902a100688a416cc25debc289706b9a
-
SSDEEP
6144:EMVDs/VZ7lvRllqa+ZksyZXt5zoDqaUBZG/j:lts/tvLQc5zwXwG/j
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-