General
-
Target
main.zip
-
Size
46.2MB
-
Sample
240709-kdyr6axekd
-
MD5
4d07e7fcd207e2d796722c43e0c38bc3
-
SHA1
bcb76b2c87fee686462bbd28e7bc34ad50714437
-
SHA256
796f20fe2e4099f7f252d232873771a4bb4dfc59e19734e07663c4ffa568c66d
-
SHA512
a96d1c88f5ed3cc1fddd477e97ed1fd5151831a8bafb43dac01a6b34f0460ddf4c2b8520387c02d09ca2e41441a7c88345fdc808d3f66da79e62d235c4755a5c
-
SSDEEP
786432:t/CeXh025PCzGfMeDPrFzFuIiOJKr6ryTvBiTI93s4UpR2ogJwi/vUXC7EXANdFh:tq+V5PCzXeLrFpuIie/rEJi+hUR2oJi9
Static task
static1
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
redline
@nmrzv88
94.228.166.68:80
Targets
-
-
Target
main.exe
-
Size
483KB
-
MD5
c719207d9274e31ec18ef2223f1e0c5e
-
SHA1
03152f0c164407c417ea0c60b375c18ec4a29aad
-
SHA256
01902b29e0b5f508f8e8e8f66ee1aff5d7cfc2ab48764d3080aad42a34c337ae
-
SHA512
547b584e45b6f362558e297221a0f2d67bbe2629a2461d6a216832aa4e716ad712b7e6dce97bbf321020fbbfe0c22d753865bf12badc46e1190707d7a89085d9
-
SSDEEP
12288:MBcF6NbhZbQHV6KuW0LEE3XNe12fu/vzA2nb2F8eO/BFlte8M8Mvsv4C9IhLHKvk:cU6NviR
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-