General
-
Target
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a
-
Size
410KB
-
Sample
231023-rwewbsbb63
-
MD5
66cf19be613af7479ee67166223b539e
-
SHA1
0065a65bf422ad211d16aae56f6fdb9b8742995b
-
SHA256
cfd6fda57f152702d53cf3a3f2b0a54e24675461747acf45f15b13d1394a8c81
-
SHA512
c122f9c47cd1c130e4dd733ee71d075273591186e22d25aa6eb8e2bbdc233bde086371d5e47d6216d82aa036e85f39233531780930ebf8d93c730b35ecf48261
-
SSDEEP
6144:SW+0X3Vyo8nkwsBnbkhFE/ytcR9ozHaBX9Yv4XSbUlcdxBVUpsrGNubpm9BKpeGA:NNYJs63FtKyaBX9Y4Soc9UZ0bm3GSf
Static task
static1
Behavioral task
behavioral1
Sample
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
Installs3000_20231023
62.72.23.19:80
Targets
-
-
Target
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a
-
Size
1.1MB
-
MD5
dcc50df94a2741682e1899444e81ebeb
-
SHA1
7b8b68244aa04e36b9a85e78d306b9dafccbf33b
-
SHA256
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a
-
SHA512
6764c83c26717ec2af28c1dc758404583233bc6eba9483a92c9d94d814b35f4bcb0a09bac146b569a876adf79a299228ef8e1ba49f5c12a1e7eb78696f11def8
-
SSDEEP
12288:WZLxMjbRoaZei8jhA9iH9x6y0BFKhTZvF9+mKe5OLfaY2X1R7RIsEPYsulocuvMp:aWjFoaZeDhA9iH9r08vSaYoRsPYB3a/Y
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-