General
-
Target
2000-153-0x0000000004A00000-0x0000000004A44000-memory.dmp
-
Size
272KB
-
Sample
240302-3vk7haae41
-
MD5
6683563c2c30dce1a6137792a7a5bf03
-
SHA1
434530a17315b5d134741e7e49eb0b3ca0ee7aee
-
SHA256
0f4a8fc427f037080ec40612f1fb6c9e26196376e930cf272eb74110e822d7ae
-
SHA512
df0100c7a42958e279d159b9ac947edd5ddaf83e19fec436106c8e9c9b4af8124949fbc9dd481f8f867853dbe751745b4372ef9af71fc17b034e04f443cbdf6a
-
SSDEEP
3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI
Behavioral task
behavioral1
Sample
2000-153-0x0000000004A00000-0x0000000004A44000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2000-153-0x0000000004A00000-0x0000000004A44000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
2000-153-0x0000000004A00000-0x0000000004A44000-memory.dmp
-
Size
272KB
-
MD5
6683563c2c30dce1a6137792a7a5bf03
-
SHA1
434530a17315b5d134741e7e49eb0b3ca0ee7aee
-
SHA256
0f4a8fc427f037080ec40612f1fb6c9e26196376e930cf272eb74110e822d7ae
-
SHA512
df0100c7a42958e279d159b9ac947edd5ddaf83e19fec436106c8e9c9b4af8124949fbc9dd481f8f867853dbe751745b4372ef9af71fc17b034e04f443cbdf6a
-
SSDEEP
3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-