General
-
Target
03f6e596a5a8e7c44cd51e4de23b5dc9
-
Size
379KB
-
Sample
231229-zwnggaadhp
-
MD5
03f6e596a5a8e7c44cd51e4de23b5dc9
-
SHA1
345bc3ac7391a42734c312ba615785ea064c149a
-
SHA256
460bb62c118015fd6d17010f323b557c3617846cd767b3ede3b77545a82b303c
-
SHA512
04bd985d8fccfd6e496f2be21d65471d9c77ef6d45e4b21aa6d92e6adfcf1de631481c78ae3d12c27eb2ca230cfde37417646f7abb55b8636af822133e762c65
-
SSDEEP
6144:VM5XL99SlhUfR1GdvYEet5nmrfVE9eHUzZOtwtwoGVc+6NrL0MvMSyySPE:G0hsR1GdvYEq5n+E9eHUzZO+twoGVc+
Static task
static1
Behavioral task
behavioral1
Sample
03f6e596a5a8e7c44cd51e4de23b5dc9.exe
Resource
win7-20231215-en
Malware Config
Extracted
redline
@Catlsp
46.8.19.177:41228
Targets
-
-
Target
03f6e596a5a8e7c44cd51e4de23b5dc9
-
Size
379KB
-
MD5
03f6e596a5a8e7c44cd51e4de23b5dc9
-
SHA1
345bc3ac7391a42734c312ba615785ea064c149a
-
SHA256
460bb62c118015fd6d17010f323b557c3617846cd767b3ede3b77545a82b303c
-
SHA512
04bd985d8fccfd6e496f2be21d65471d9c77ef6d45e4b21aa6d92e6adfcf1de631481c78ae3d12c27eb2ca230cfde37417646f7abb55b8636af822133e762c65
-
SSDEEP
6144:VM5XL99SlhUfR1GdvYEet5nmrfVE9eHUzZOtwtwoGVc+6NrL0MvMSyySPE:G0hsR1GdvYEq5n+E9eHUzZO+twoGVc+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of SetThreadContext
-