General
-
Target
b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74
-
Size
928KB
-
Sample
231011-28pamsbc4v
-
MD5
1fe3a6c6588cc205e0f745cd266e0152
-
SHA1
6fbd99ea26eb84c7c2a16e957a65cef3a59d43ff
-
SHA256
b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74
-
SHA512
c8535379d939ce7ef90b306e4aa0476a0e030bfdd51e1737c2b339549ab8c4730738930ea724c0ca1d00dbcb84e47ca4fcc5117790dabdd9915f15bb7382323c
-
SSDEEP
12288:BMroy90cVguWxanaYyRvgfF5jLqcOsTmH/HXt4jxAmTQw2VuKrUYxFsfg:py3VgRE34gfXic8/Xt4tQw2VRrig
Static task
static1
Behavioral task
behavioral1
Sample
b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74
-
Size
928KB
-
MD5
1fe3a6c6588cc205e0f745cd266e0152
-
SHA1
6fbd99ea26eb84c7c2a16e957a65cef3a59d43ff
-
SHA256
b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74
-
SHA512
c8535379d939ce7ef90b306e4aa0476a0e030bfdd51e1737c2b339549ab8c4730738930ea724c0ca1d00dbcb84e47ca4fcc5117790dabdd9915f15bb7382323c
-
SSDEEP
12288:BMroy90cVguWxanaYyRvgfF5jLqcOsTmH/HXt4jxAmTQw2VuKrUYxFsfg:py3VgRE34gfXic8/Xt4tQw2VRrig
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-