General
-
Target
1972-155-0x00000000048F0000-0x0000000004934000-memory.dmp
-
Size
272KB
-
Sample
240303-c1q2tsbf3v
-
MD5
397aba39bb9b722305e11ddb26de18c0
-
SHA1
f9f5f8d9cbea6b17ccb6ec1bd09f1dcd8c5f2fb6
-
SHA256
7faa7c1f57a52facbe48a511e2a979a1a7defd881e7913ad0069a27ede2a027e
-
SHA512
a4de2cab2df50d99693dc9232284e55225e151f950d5ee7458b98e3af12782b75bc0c1c917f81bea25fb145bdbf49b661b2a5daec515517d4de5000252556bfe
-
SSDEEP
3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI
Behavioral task
behavioral1
Sample
1972-155-0x00000000048F0000-0x0000000004934000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1972-155-0x00000000048F0000-0x0000000004934000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
1972-155-0x00000000048F0000-0x0000000004934000-memory.dmp
-
Size
272KB
-
MD5
397aba39bb9b722305e11ddb26de18c0
-
SHA1
f9f5f8d9cbea6b17ccb6ec1bd09f1dcd8c5f2fb6
-
SHA256
7faa7c1f57a52facbe48a511e2a979a1a7defd881e7913ad0069a27ede2a027e
-
SHA512
a4de2cab2df50d99693dc9232284e55225e151f950d5ee7458b98e3af12782b75bc0c1c917f81bea25fb145bdbf49b661b2a5daec515517d4de5000252556bfe
-
SSDEEP
3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-