General
-
Target
0366013a315bfd1c6d74e02339c10bc3
-
Size
283KB
-
Sample
231229-zfngjahed2
-
MD5
0366013a315bfd1c6d74e02339c10bc3
-
SHA1
77b323c721ecf1c6c56158a6a1e2d0ce9cf0bf36
-
SHA256
d1b5492aa58d4b83f4f72d18a961622e034f22d50436dd527cbaa669cc9987f0
-
SHA512
b5c1b46992d9c44353053197a26f951e93e143adfae85cb0814a3a8aff9402a2283c23afdca406b3a4513fb849eebb65e46f6733a16c40b1d5ba891a2323b797
-
SSDEEP
6144:/xZh6Q6von8kz96rAYwc5lzbBADYD953RY2xG3a2VXfFsrWM:J6QuSklJ55VAz3aKFsrWM
Static task
static1
Behavioral task
behavioral1
Sample
0366013a315bfd1c6d74e02339c10bc3.exe
Resource
win7-20231215-en
Malware Config
Extracted
redline
prolivYT
188.165.229.219:31829
Targets
-
-
Target
0366013a315bfd1c6d74e02339c10bc3
-
Size
283KB
-
MD5
0366013a315bfd1c6d74e02339c10bc3
-
SHA1
77b323c721ecf1c6c56158a6a1e2d0ce9cf0bf36
-
SHA256
d1b5492aa58d4b83f4f72d18a961622e034f22d50436dd527cbaa669cc9987f0
-
SHA512
b5c1b46992d9c44353053197a26f951e93e143adfae85cb0814a3a8aff9402a2283c23afdca406b3a4513fb849eebb65e46f6733a16c40b1d5ba891a2323b797
-
SSDEEP
6144:/xZh6Q6von8kz96rAYwc5lzbBADYD953RY2xG3a2VXfFsrWM:J6QuSklJ55VAz3aKFsrWM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of SetThreadContext
-