General
-
Target
4a1283a4a265030f72e946f7852501945b8ea0c4788d369d4c3354eedebc8b6f
-
Size
1.4MB
-
Sample
231031-wfqecaca4v
-
MD5
93f5bde2f4546441b4688e7abbfe8d75
-
SHA1
20efe17f6a046ee169cbc0cebb9e88a798abb5ae
-
SHA256
601e143c91ecf3888c08e88952f8a33a5072be80dd9f683f286ff216e4949f70
-
SHA512
20aee1a1ad737d0922c0b0f73d80f778334aa798777bae2cee719062c7c8699f91c33972d8e791fd6269bf33b36d205ee39dafe5c01aff829ecd8543e418fb05
-
SSDEEP
24576:KypvdL5pnn/z5Alsp8BAujzPolPwpFkCiMND2O+4NBv3awGXSGPSHI+D5pEg:RDL5pntIq8BAmPqPwpFkRMNLXNZmXFiF
Static task
static1
Behavioral task
behavioral1
Sample
4a1283a4a265030f72e946f7852501945b8ea0c4788d369d4c3354eedebc8b6f.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
4a1283a4a265030f72e946f7852501945b8ea0c4788d369d4c3354eedebc8b6f
-
Size
1.5MB
-
MD5
c629ba55eb36aca092419edad8dd05d3
-
SHA1
a40b4083f9f4679badecac2665aad149acda5993
-
SHA256
4a1283a4a265030f72e946f7852501945b8ea0c4788d369d4c3354eedebc8b6f
-
SHA512
7fd500dff0559756d654a76f8c3fed39e26a10d3dacc348c4be7b526957afa0f7b0426a09a9f0e1b17837c1875f537aeb26db824985145ccbceafcf35178838a
-
SSDEEP
24576:PytL59nfjzlCsX8HC2NzvUFeCiANRlOI5CBvp6AGXUGTSHIUD51E:atL59foG8HCSvUFeRANRYwCT4XLiIUD
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-