General
-
Target
4220-137-0x0000000004F10000-0x0000000004F4E000-memory.dmp
-
Size
248KB
-
Sample
240304-le54asfa2z
-
MD5
00f09f0710b96ba93eb3649aae1f6619
-
SHA1
263b3e59a3931cb8168cd1ed3625ead5501d7237
-
SHA256
4cc6652a11751dc31c302a69c4978ce55c6e2d0f417fff41f48a8cef784739cb
-
SHA512
ef8cef676d67db12dccb04d2e35c9eab63d995ed0f0d330f5323b4a99feba2f68e53c06c2e21010bc472f614f8e8e5cdca5761ffb86ba1a0725f8060c53e7035
-
SSDEEP
3072:C6j1ELs6B3bDCkIopDKmH+Hi0Ji/ep4u0DCjgAo40Jg2Shc+ny6PxG2Z2C9xNn2M:C6jk39IoZKmwLaefGk2ShPny0I
Behavioral task
behavioral1
Sample
4220-137-0x0000000004F10000-0x0000000004F4E000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4220-137-0x0000000004F10000-0x0000000004F4E000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
Build1
185.189.151.109:36839
-
auth_value
d676f4d8230f2d1faff9a183479712d6
Targets
-
-
Target
4220-137-0x0000000004F10000-0x0000000004F4E000-memory.dmp
-
Size
248KB
-
MD5
00f09f0710b96ba93eb3649aae1f6619
-
SHA1
263b3e59a3931cb8168cd1ed3625ead5501d7237
-
SHA256
4cc6652a11751dc31c302a69c4978ce55c6e2d0f417fff41f48a8cef784739cb
-
SHA512
ef8cef676d67db12dccb04d2e35c9eab63d995ed0f0d330f5323b4a99feba2f68e53c06c2e21010bc472f614f8e8e5cdca5761ffb86ba1a0725f8060c53e7035
-
SSDEEP
3072:C6j1ELs6B3bDCkIopDKmH+Hi0Ji/ep4u0DCjgAo40Jg2Shc+ny6PxG2Z2C9xNn2M:C6jk39IoZKmwLaefGk2ShPny0I
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-