General
-
Target
8f971c054cd506d521cd458102d4025f
-
Size
199KB
-
Sample
240204-tnbj2sdhd3
-
MD5
8f971c054cd506d521cd458102d4025f
-
SHA1
5c938e37701bc4a287343b283938bdcb1c0f27b0
-
SHA256
935a82b438893da3447df6631f85b494e48c474b410d09199b9a80359506232c
-
SHA512
50733b0fa5748bc6b0145b1139d56a3af96f5c9aa9b337063f3484ad5e4bb012db1615675ad8c78842eb49ccca475493de90a7a733fe01fe341bd5f818e856d3
-
SSDEEP
3072:b2HR1GaR3X65QahMBrvvbbk9alOx9IqjSLseQOOtpQWtgX/:b2h65QahMBzvbbtOT9jSLseQNPQWtg
Static task
static1
Behavioral task
behavioral1
Sample
8f971c054cd506d521cd458102d4025f.exe
Resource
win7-20231215-en
Malware Config
Extracted
redline
@kexit99
45.81.227.32:22625
Targets
-
-
Target
8f971c054cd506d521cd458102d4025f
-
Size
199KB
-
MD5
8f971c054cd506d521cd458102d4025f
-
SHA1
5c938e37701bc4a287343b283938bdcb1c0f27b0
-
SHA256
935a82b438893da3447df6631f85b494e48c474b410d09199b9a80359506232c
-
SHA512
50733b0fa5748bc6b0145b1139d56a3af96f5c9aa9b337063f3484ad5e4bb012db1615675ad8c78842eb49ccca475493de90a7a733fe01fe341bd5f818e856d3
-
SSDEEP
3072:b2HR1GaR3X65QahMBrvvbbk9alOx9IqjSLseQOOtpQWtgX/:b2h65QahMBzvbbtOT9jSLseQNPQWtg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of SetThreadContext
-