General
-
Target
Setup (PA$S 5577).rar
-
Size
240KB
-
Sample
230607-sp6adacg2z
-
MD5
c5213545f159a6e759bb26b0d8a896bf
-
SHA1
390f5202a81e4b19847341844b1b8a63502f74ce
-
SHA256
1299158396c2f5928f04bcaf230d879fe309020b1a59c11ab27ff2ca1424aef2
-
SHA512
a06cc04af4c9413ee9cc9ce6a08afc68932aeb2534555c63bbeff4131749a4518b1d26dc22368ecf5965ed985a22c1fb166ccd9e775bb4ae13f546780ae307ed
-
SSDEEP
6144:7FH9B3bnNB/RdmwqfAbMxSzIpS01eGUkiOnigWoWAeji:7PB/ReUMxOacGUkVigWTA/
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
95.217.14.200:16615
-
auth_value
1bfac947c350008abe813772b735f0fc
Targets
-
-
Target
Setup.exe
-
Size
1023.0MB
-
MD5
c34763ada7e3f7ee62a1278c75a90bc6
-
SHA1
c507f38f806b76d265f6b34ca7b99e29990541d2
-
SHA256
6a5be3b1390562e7ea8786e4282b1058bebe5940c9136ad9df4ec5674f25f445
-
SHA512
7c5bfcebde336816dadbd25d0c3b16b77cc244f06bf2d61d0d3cf989496be52bc91c1da59d168aa6fb8e147ef64619d798c1265842ad21d562d83c90bd5b4780
-
SSDEEP
3072:WKDhD5ky4+7yyjPpJlSMDsHs+YNZDxujz4jo0o6RD/tH3pFgqvSjQ4qITpFH8bd:XymJlSMgHs7dxujgRpHjTSjt/TY
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-