General
-
Target
NEAS.9e94ef1b931f68f722a69465756bbe30.exe
-
Size
758KB
-
Sample
231103-l9dbrsac23
-
MD5
9e94ef1b931f68f722a69465756bbe30
-
SHA1
f32835ba07cd05bbc2311939ce3b4117f67f21ab
-
SHA256
c4250eab48d9405545214da261a19ccd6e3e4652a5bde20d9e585bf9e80f2201
-
SHA512
890469d459e8743b9dbda8b23cf140b4f650c3a6de8c8727f80fa0f776f95102c65d1d1f7076fb21a92c816ca090bae141e104ba1a6b8f6c4102355d45739b40
-
SSDEEP
12288:qMrwy90iGvdod+IPeKys3IGolDC9VCXmp9EosFw1ODY8h8wlxxUa0bfKN:yyV0dbe3d4DDsVWNosF1Y8h8wtiq
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9e94ef1b931f68f722a69465756bbe30.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
NEAS.9e94ef1b931f68f722a69465756bbe30.exe
-
Size
758KB
-
MD5
9e94ef1b931f68f722a69465756bbe30
-
SHA1
f32835ba07cd05bbc2311939ce3b4117f67f21ab
-
SHA256
c4250eab48d9405545214da261a19ccd6e3e4652a5bde20d9e585bf9e80f2201
-
SHA512
890469d459e8743b9dbda8b23cf140b4f650c3a6de8c8727f80fa0f776f95102c65d1d1f7076fb21a92c816ca090bae141e104ba1a6b8f6c4102355d45739b40
-
SSDEEP
12288:qMrwy90iGvdod+IPeKys3IGolDC9VCXmp9EosFw1ODY8h8wlxxUa0bfKN:yyV0dbe3d4DDsVWNosF1Y8h8wtiq
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-