General
-
Target
tmp
-
Size
1.3MB
-
Sample
230805-kar57sah99
-
MD5
2ddbd7e7fdf9bf2edfa375ad6fe2f6f5
-
SHA1
7f8fb773d3c17d05dcf46802b33f024b53c48c96
-
SHA256
9354c11be1fbde7607e1139a9fecff5269d7f8dba8f6fbe35c950074bc0cdefe
-
SHA512
7c4224441c5b497635294866c999d9d601248ff16272b2cf4f3f2b91c6e08ab51d2d273b91cac24eafcea4018daa339d0ff62b33b1540fbf9aaa4e7b9f3e1c29
-
SSDEEP
12288:dTVIe2S3HqYM7d6197u0cyUWf5GIkB1DlGul3VbCb2mGmPPNru7+glPm5PozTjuM:/3HqX7d6197u1yVUl3VuamXPNc+ipp
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
@oleh_ps
176.123.9.85:16482
-
auth_value
24848220823af15a5e52db502394fad3
Targets
-
-
Target
tmp
-
Size
1.3MB
-
MD5
2ddbd7e7fdf9bf2edfa375ad6fe2f6f5
-
SHA1
7f8fb773d3c17d05dcf46802b33f024b53c48c96
-
SHA256
9354c11be1fbde7607e1139a9fecff5269d7f8dba8f6fbe35c950074bc0cdefe
-
SHA512
7c4224441c5b497635294866c999d9d601248ff16272b2cf4f3f2b91c6e08ab51d2d273b91cac24eafcea4018daa339d0ff62b33b1540fbf9aaa4e7b9f3e1c29
-
SSDEEP
12288:dTVIe2S3HqYM7d6197u0cyUWf5GIkB1DlGul3VbCb2mGmPPNru7+glPm5PozTjuM:/3HqX7d6197u1yVUl3VuamXPNc+ipp
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-