General
-
Target
404f2d2629f40e85a44f73a6e75ea8ead6d34b0a5e1eb3af4a9972985b517fac
-
Size
15.5MB
-
Sample
231105-p4jhdagh64
-
MD5
43dd43083bf57daf439d6aafc84bb1f2
-
SHA1
b71f215b2bda432d40c542b0ddf2a6d3920a236b
-
SHA256
404f2d2629f40e85a44f73a6e75ea8ead6d34b0a5e1eb3af4a9972985b517fac
-
SHA512
167c52bc7a590895a3565699a05e681af7e9e2be4af0fb777d03a5112bb425d08145a7955fd26922c2fdc3410e2af814351a5de01545724356cbe8f11afb7580
-
SSDEEP
98304:OcO2xKWhq+01YwnP31dTYoQ0dHc6bqJO:Off/0oQA86bp
Static task
static1
Behavioral task
behavioral1
Sample
404f2d2629f40e85a44f73a6e75ea8ead6d34b0a5e1eb3af4a9972985b517fac.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
YT&TEAM CLOUD
194.169.175.235:42691
Targets
-
-
Target
404f2d2629f40e85a44f73a6e75ea8ead6d34b0a5e1eb3af4a9972985b517fac
-
Size
15.5MB
-
MD5
43dd43083bf57daf439d6aafc84bb1f2
-
SHA1
b71f215b2bda432d40c542b0ddf2a6d3920a236b
-
SHA256
404f2d2629f40e85a44f73a6e75ea8ead6d34b0a5e1eb3af4a9972985b517fac
-
SHA512
167c52bc7a590895a3565699a05e681af7e9e2be4af0fb777d03a5112bb425d08145a7955fd26922c2fdc3410e2af814351a5de01545724356cbe8f11afb7580
-
SSDEEP
98304:OcO2xKWhq+01YwnP31dTYoQ0dHc6bqJO:Off/0oQA86bp
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-