General
-
Target
a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a
-
Size
1.0MB
-
Sample
231012-fknhjsad97
-
MD5
e2afde3ecee647cf8f500c6fd14cab42
-
SHA1
9419ba9d941cb8ea3bf0b408ed21532cdfd1ab9f
-
SHA256
a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a
-
SHA512
6df25575750b5863f6a09be57837ab57c569992ca0323d510bbaebfa71c3de4c88d9251303b2b305ce7906600af3bb290629fc25b493edbd13f9a21a88114c96
-
SSDEEP
12288:iMrIy90xp6n3TkjztmSR5TsMNAt9kMUAKYi0DgNleWGXyJUvK++8G/72yRr8+6dQ:iynotT9LAXnDOeruoERLWWlchFij
Static task
static1
Behavioral task
behavioral1
Sample
a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a
-
Size
1.0MB
-
MD5
e2afde3ecee647cf8f500c6fd14cab42
-
SHA1
9419ba9d941cb8ea3bf0b408ed21532cdfd1ab9f
-
SHA256
a0f8e2b26c6c20bd278a67028fd951544c26fe408490a65de58b8e8212ee9a9a
-
SHA512
6df25575750b5863f6a09be57837ab57c569992ca0323d510bbaebfa71c3de4c88d9251303b2b305ce7906600af3bb290629fc25b493edbd13f9a21a88114c96
-
SSDEEP
12288:iMrIy90xp6n3TkjztmSR5TsMNAt9kMUAKYi0DgNleWGXyJUvK++8G/72yRr8+6dQ:iynotT9LAXnDOeruoERLWWlchFij
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-