General
-
Target
data64_2.exe
-
Size
1.5MB
-
Sample
230629-s8w6taeg2y
-
MD5
78cdf3b9c25732723d3dda33f24b8eb6
-
SHA1
9b20b94b45c53b44097996c6e1b2577f5f9e7800
-
SHA256
c7bb516ffce734e561f4b1a7ddc9174b8c5b44f41c01e2cdb226374e8ab489b5
-
SHA512
1d8f04f278db53c255ade12e5586c966ddcda25836ee7b624508b5ccd11d2b05ff0ec7a47bca4a09549c9247bcc7601ec50c4cbdd54b589711418563bc377449
-
SSDEEP
12288:D1H3wPfh3XXPhQu1/cX6iXdHdq1wCUMfH9YSRUS+Ku:5X+hHB1/cpdHdq/UMfdTPM
Static task
static1
Behavioral task
behavioral1
Sample
data64_2.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
data64_2.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
redline
Barret2606
168.119.239.218:36938
-
auth_value
344d2ed02c1a6675701a7c3ab5c4c12e
Targets
-
-
Target
data64_2.exe
-
Size
1.5MB
-
MD5
78cdf3b9c25732723d3dda33f24b8eb6
-
SHA1
9b20b94b45c53b44097996c6e1b2577f5f9e7800
-
SHA256
c7bb516ffce734e561f4b1a7ddc9174b8c5b44f41c01e2cdb226374e8ab489b5
-
SHA512
1d8f04f278db53c255ade12e5586c966ddcda25836ee7b624508b5ccd11d2b05ff0ec7a47bca4a09549c9247bcc7601ec50c4cbdd54b589711418563bc377449
-
SSDEEP
12288:D1H3wPfh3XXPhQu1/cX6iXdHdq1wCUMfH9YSRUS+Ku:5X+hHB1/cpdHdq/UMfdTPM
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-