General
-
Target
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46
-
Size
1.7MB
-
Sample
240502-gzjnksdc57
-
MD5
cd956b35a1378870c1aafd2d2d5a6621
-
SHA1
3dc055ee508e725b648566284cd76eee987d20f0
-
SHA256
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46
-
SHA512
e194d936dee2fb0c4a91ada07a43353df877a185d85176c06619d6264ae9d3b53e31af92ee50cfb90d27c9330ed8bcf9e01629835796b3105684ec5e7e4b40cd
-
SSDEEP
49152:VFKcjeOqD/WNb+1hY4fOVlT/DKu9Lq7V9B8:VFS/Yb+1hY4fOVlT/DKu9Lq
Static task
static1
Behavioral task
behavioral1
Sample
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46
-
Size
1.7MB
-
MD5
cd956b35a1378870c1aafd2d2d5a6621
-
SHA1
3dc055ee508e725b648566284cd76eee987d20f0
-
SHA256
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46
-
SHA512
e194d936dee2fb0c4a91ada07a43353df877a185d85176c06619d6264ae9d3b53e31af92ee50cfb90d27c9330ed8bcf9e01629835796b3105684ec5e7e4b40cd
-
SSDEEP
49152:VFKcjeOqD/WNb+1hY4fOVlT/DKu9Lq7V9B8:VFS/Yb+1hY4fOVlT/DKu9Lq
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-