General
-
Target
ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6
-
Size
282KB
-
Sample
230607-3y4s1shd79
-
MD5
86f357bb2281536f7d1861a6ad5a057b
-
SHA1
7c4f580b18da8a10565ca5ab45e07d3e8ffb045d
-
SHA256
ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6
-
SHA512
5275e76d1390015601461e1c471571824c30e721b43af7e0ed8b912fd50b9f8006c894c6abcb6ced6e3e2c0050098a6cafae0e35cabbfad50c6988c49eb8e95e
-
SSDEEP
6144:tQvoWvJfCtUWwvTygXUNVS4MGh1aBFrvz1xcxcWhNrt:tUokyR1aBFrvz1xcxdNrt
Static task
static1
Behavioral task
behavioral1
Sample
ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Targets
-
-
Target
ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6
-
Size
282KB
-
MD5
86f357bb2281536f7d1861a6ad5a057b
-
SHA1
7c4f580b18da8a10565ca5ab45e07d3e8ffb045d
-
SHA256
ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6
-
SHA512
5275e76d1390015601461e1c471571824c30e721b43af7e0ed8b912fd50b9f8006c894c6abcb6ced6e3e2c0050098a6cafae0e35cabbfad50c6988c49eb8e95e
-
SSDEEP
6144:tQvoWvJfCtUWwvTygXUNVS4MGh1aBFrvz1xcxcWhNrt:tUokyR1aBFrvz1xcxdNrt
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-