General
-
Target
0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49
-
Size
1.5MB
-
Sample
230802-ecaq2sce72
-
MD5
0f09cef79b5954fe8741e04f850608ef
-
SHA1
3e3ede45feda3aa5c61068d98afc99085aedc70d
-
SHA256
0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49
-
SHA512
54a689c5ee38a00af2178294b5ff4fd9f03bb26c895c240056a3e6a46510f1f691c547f93fa1a422568bafa76aa1a1feb13fe41e2926c8555413bc161c3e15ea
-
SSDEEP
24576:2JKhiQ1mEAofpfawMUGWQpVRQPlxJrrP:wQcEAofpf4/p
Static task
static1
Behavioral task
behavioral1
Sample
0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
@oleh_ps
176.123.9.85:16482
-
auth_value
24848220823af15a5e52db502394fad3
Targets
-
-
Target
0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49
-
Size
1.5MB
-
MD5
0f09cef79b5954fe8741e04f850608ef
-
SHA1
3e3ede45feda3aa5c61068d98afc99085aedc70d
-
SHA256
0abf4d06d367f859ffa382f1e05fc9dfeac9463290992132a0955b71f03f8d49
-
SHA512
54a689c5ee38a00af2178294b5ff4fd9f03bb26c895c240056a3e6a46510f1f691c547f93fa1a422568bafa76aa1a1feb13fe41e2926c8555413bc161c3e15ea
-
SSDEEP
24576:2JKhiQ1mEAofpfawMUGWQpVRQPlxJrrP:wQcEAofpf4/p
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-