General
-
Target
file.exe
-
Size
685KB
-
Sample
230718-pygrlaba6t
-
MD5
6611c346195622a1cd5edc04aa03faee
-
SHA1
e1277086b58032d9ced044966aaeff8597ed6127
-
SHA256
d66083551f8ae90df7e5649b96d02551322707019c6721e59346341593baa6d3
-
SHA512
19ded98e3c403dc367d3d86dc103cd20de1c95555ccf8fe0ea32cd7537c172db9d7b46786ac6488d4f201699a50d296a3bfd6c96f070a99ff73840b8aea214c6
-
SSDEEP
12288:gHlEtGp/N7yKB9UyTLrY1XzBlflu2qwC5Y75Uda/EwYbyaZ:OGGp/LrYdfxC5Y75UE7
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
CosmicCloud (https://cloudcosmic.store)
157.254.164.98:28449
-
auth_value
dd6f6a88a2f6e474f5facc69ce29d130
Targets
-
-
Target
file.exe
-
Size
685KB
-
MD5
6611c346195622a1cd5edc04aa03faee
-
SHA1
e1277086b58032d9ced044966aaeff8597ed6127
-
SHA256
d66083551f8ae90df7e5649b96d02551322707019c6721e59346341593baa6d3
-
SHA512
19ded98e3c403dc367d3d86dc103cd20de1c95555ccf8fe0ea32cd7537c172db9d7b46786ac6488d4f201699a50d296a3bfd6c96f070a99ff73840b8aea214c6
-
SSDEEP
12288:gHlEtGp/N7yKB9UyTLrY1XzBlflu2qwC5Y75Uda/EwYbyaZ:OGGp/LrYdfxC5Y75UE7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-