General
-
Target
mark.exe
-
Size
4.0MB
-
Sample
240117-kesbrsbgel
-
MD5
f81daa62b8a7faba9b529b0c87d3caa2
-
SHA1
0df66176605d810ccb12644e3c94c2de703ce1d5
-
SHA256
ca90a2014f3fcf373516b62575649dfa84005a5bba929be80732076a72e5b249
-
SHA512
065e4f88cdb4a16390475ed49c86046208e8db01313e34b09cc4965234f92ac371488a65a57c06ea27802aea9c75a4afdf59724e193e2c2a218128e43f054be0
-
SSDEEP
49152:0yX+ajZM0IE8omYWh5gu/8qaR2ihf6TI76DPPjhVTZW3bGnWjZ5wVg76Dcj741a0:0yXDdIE2YcGuUfRPhfoHTYeQOVgua0
Static task
static1
Behavioral task
behavioral1
Sample
mark.exe
Resource
win7-20231215-en
Malware Config
Extracted
bitrat
1.38
serese.duckdns.org:20612
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Targets
-
-
Target
mark.exe
-
Size
4.0MB
-
MD5
f81daa62b8a7faba9b529b0c87d3caa2
-
SHA1
0df66176605d810ccb12644e3c94c2de703ce1d5
-
SHA256
ca90a2014f3fcf373516b62575649dfa84005a5bba929be80732076a72e5b249
-
SHA512
065e4f88cdb4a16390475ed49c86046208e8db01313e34b09cc4965234f92ac371488a65a57c06ea27802aea9c75a4afdf59724e193e2c2a218128e43f054be0
-
SSDEEP
49152:0yX+ajZM0IE8omYWh5gu/8qaR2ihf6TI76DPPjhVTZW3bGnWjZ5wVg76Dcj741a0:0yXDdIE2YcGuUfRPhfoHTYeQOVgua0
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-