General
-
Target
4d9bea57826f770c3a3e696d2d6b3e83a812e9d705e6f6d8a533d0e4bf62ccbb
-
Size
1.4MB
-
Sample
231101-t7ljcscc43
-
MD5
0e1cf04c2d688bd79b8c98c5ee931284
-
SHA1
b1b5cce59da9d5dd522ff7906eaad4738909cae6
-
SHA256
ce1c9194422368898717517c5482754243961d05a13bb0a8c2879c6bb0326616
-
SHA512
8b3b30babe3ad2168cd25c671e48b68d37379d731704ae0647c757090c12294871313b8c67d2e1aac42ecf41765367399ebff91455b3bcd7cbe25603fd1bfe9c
-
SSDEEP
24576:ryGHGS4LUQ62J274+iC09+L2kAw8AGulh06KzmAybHonLLj8wssPURV9fWAvh3:eoYLUQgJil+akl8OhQTnLLj8DRVRWYV
Static task
static1
Behavioral task
behavioral1
Sample
4d9bea57826f770c3a3e696d2d6b3e83a812e9d705e6f6d8a533d0e4bf62ccbb.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
4d9bea57826f770c3a3e696d2d6b3e83a812e9d705e6f6d8a533d0e4bf62ccbb
-
Size
1.5MB
-
MD5
0bbe0f48f0f4195776df48611363176d
-
SHA1
ff61aff512d07a409859810f5a6c7ffd240559db
-
SHA256
4d9bea57826f770c3a3e696d2d6b3e83a812e9d705e6f6d8a533d0e4bf62ccbb
-
SHA512
e3e532cd49f089270f301ce3750793ffde5edf0f41bc3b5d518660ecde682360f8f942df7cbfce3ec05b559e0186c502438b17a9931e313f49c100f9a0a5f1c1
-
SSDEEP
24576:Xy1HGa43UQ6cJ2p4saa07+/2kZ8xj9Rw6qEiyb7olLTj8kichUq0:iNe3UQyna7+OkZ8xJRE9lLTj8P
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-