General
-
Target
45d0efaba2caf518e649d387606d1ebe479cb8f9fe3baf7259f2905a6c9a6b96
-
Size
173KB
-
Sample
230615-y9yc6abb76
-
MD5
98e4b1b5b793b2ece39ac08b5b175968
-
SHA1
cb95d3e37bf7890dbaa0d59a0ac1afdff3814e33
-
SHA256
45d0efaba2caf518e649d387606d1ebe479cb8f9fe3baf7259f2905a6c9a6b96
-
SHA512
619f262a7c83c0e73279c814a1f49f84d55f5f0bb0d514c504f200b4b227c50868858e1d7eed2f17885077bb0db4e237e92696e1b3d6451b91309ef4b4f90756
-
SSDEEP
3072:1b1Memvvf8fdrBOFZ9hTLfN1g0CnHYPlk3UBjuU3/MCANWFHn36CS/:3Memvvf8iFZHHfNCHYP885ANWFQ
Static task
static1
Behavioral task
behavioral1
Sample
45d0efaba2caf518e649d387606d1ebe479cb8f9fe3baf7259f2905a6c9a6b96.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
45d0efaba2caf518e649d387606d1ebe479cb8f9fe3baf7259f2905a6c9a6b96
-
Size
173KB
-
MD5
98e4b1b5b793b2ece39ac08b5b175968
-
SHA1
cb95d3e37bf7890dbaa0d59a0ac1afdff3814e33
-
SHA256
45d0efaba2caf518e649d387606d1ebe479cb8f9fe3baf7259f2905a6c9a6b96
-
SHA512
619f262a7c83c0e73279c814a1f49f84d55f5f0bb0d514c504f200b4b227c50868858e1d7eed2f17885077bb0db4e237e92696e1b3d6451b91309ef4b4f90756
-
SSDEEP
3072:1b1Memvvf8fdrBOFZ9hTLfN1g0CnHYPlk3UBjuU3/MCANWFHn36CS/:3Memvvf8iFZHHfNCHYP885ANWFQ
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-