Overview
overview
10Static
static
10Redline_20...er.exe
windows7-x64
1Redline_20...er.exe
windows10-2004-x64
1Redline_20...db.dll
windows7-x64
1Redline_20...db.dll
windows10-2004-x64
1Redline_20...db.dll
windows7-x64
1Redline_20...db.dll
windows10-2004-x64
1Redline_20...ks.dll
windows7-x64
1Redline_20...ks.dll
windows10-2004-x64
1Redline_20...ks.pdb
windows7-x64
3Redline_20...ks.pdb
windows10-2004-x64
3Redline_20...il.dll
windows7-x64
1Redline_20...il.dll
windows10-2004-x64
1Redline_20...ub.exe
windows7-x64
10Redline_20...ub.exe
windows10-2004-x64
10Redline_20...st.exe
windows7-x64
1Redline_20...st.exe
windows10-2004-x64
1Redline_20...CF.dll
windows7-x64
1Redline_20...CF.dll
windows10-2004-x64
1Redline_20...er.exe
windows7-x64
4Redline_20...er.exe
windows10-2004-x64
4Redline_20...).docx
windows7-x64
4Redline_20...).docx
windows10-2004-x64
1Redline_20...).docx
windows7-x64
4Redline_20...).docx
windows10-2004-x64
1Redline_20...el.exe
windows7-x64
9Redline_20...el.exe
windows10-2004-x64
9General
-
Target
Redline_20_2 (1).zip
-
Size
24.7MB
-
Sample
240717-zxcrcsygln
-
MD5
4da98cd736e5b37c9d9fefaf06658291
-
SHA1
fd366d4079368c11605ae86fe409417951e1755c
-
SHA256
adaff2a5452d8fc95c2188be2630e823730104569abb4584c18c63705c2c5dd2
-
SHA512
6f5e95ec9a47e3ac76a422cbb7bee4669fecda4a6bf70eef64ae3597bedf40c10b03f866bc503872552ebd44418e50a5bdabaf6d1b1ff7511f0a59542a7bb25f
-
SSDEEP
393216:Wqn6vsKw921lcc0kqRY78G0CYXRpDmbdTTia/7USGo+3rjmKr4YYH+EUWpgXZ:Wqn6MKcbkVoGJMflhZ3rjB4cW6J
Behavioral task
behavioral1
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Kurome.Builder.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Kurome.Builder.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Mdb.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Mdb.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Pdb.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Rocks.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Rocks.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Rocks.pdb
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Rocks.pdb
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/stub.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/stub.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Host/Kurome.Host.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Host/Kurome.Host.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Host/Kurome.WCF.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Host/Kurome.WCF.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Loader/Kurome.Loader.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Redline_20_2/Redline_20_2_stealer-main/Kurome.Loader/Kurome.Loader.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/FAQ (English).docx
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/FAQ (English).docx
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/FAQ(RUS).docx
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/FAQ(RUS).docx
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/Panel/Panel.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Kurome.Builder.exe
-
Size
137KB
-
MD5
cf38a4bde3fe5456dcaf2b28d3bfb709
-
SHA1
711518af5fa13f921f3273935510627280730543
-
SHA256
c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e
-
SHA512
3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc
-
SSDEEP
3072:abrwd8T7vH96NLS+ld4qRdxtiZQRWkmVnt749m3DIo9O:aH3TLH96NLS+n46dxICRcVntX
Score1/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Mdb.dll
-
Size
42KB
-
MD5
1c6aca0f1b1fa1661fc1e43c79334f7c
-
SHA1
ec0f591a6d12e1ea7dc8714ec7e5ad7a04ef455d
-
SHA256
411f8ed8c49738fa38a56ed8f991d556227d13602e83186e66ae1c4f821c940b
-
SHA512
1c59e939d108f15881d29fe4ced4e5fa4a4476394b58b6eb464da77192cb8fe9221b7cd780af4596914d4cce7c3fc53f1bb567f944c58829de8efbe1fd87be76
-
SSDEEP
768:Ar5EYZep98C87KHeBUZwrEzsEAnbF+em50KktmM4CRIcZwMRTIzMAtpw:Ar59g98C87KHeBUb5AnZG+zdwMRTzAtS
Score1/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Pdb.dll
-
Size
87KB
-
MD5
6d5eb860c2be5dbeb470e7d3f3e7dda4
-
SHA1
80c76660b87c52127b1a7da48e27700f75362041
-
SHA256
447ede1984bb4acd73bd97c0ec57a11c079cee8301c91fb199ca98c1906d3cc4
-
SHA512
64cf4fe7de68a35720d2b9338ba9cf182e127d95d72d2ccf7ff5c73a368133663e70c988a460825fa87b2d03717a4447948d5262f56aceb7c3bf1cb3ab5a41a5
-
SSDEEP
1536:2OCAsdBo+am5OMwr5IlALYKXgAJGsZhTjrjvjCXeO:ZCjta0OMuIlArVJGqT/jveXeO
Score1/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Rocks.dll
-
Size
27KB
-
MD5
6e7f0f4fff6c49e3f66127c23b7f1a53
-
SHA1
14a529f8c7ee9f002d1e93dcf8ff158ab74c7e1a
-
SHA256
2e2623319bdc362974a78ea4a43f4893011ec257884d24267f4594142fcd436e
-
SHA512
0c773da6717dd6919cd6241d3cee26ab00bb61ea2dbeff24844a067af4c87ff5cbdb2fe3ada5db4707cee921b3fb353bd12ee22b8490597d4f67ad39bace235e
-
SSDEEP
384:70ve8JOuJ5iC7n2NwxEXCni+VXcMeDz8PmR1ugLoaeuLMBG9UphJAprjE3uFLHa9:7+m4iCyrXOhG8uRssveum1pMFLHFBvd
Score1/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.Rocks.pdb
-
Size
8KB
-
MD5
4c98b54bf658db95dfb4d1ae6bed2565
-
SHA1
c5a0035a75f52addeb730102fd67d3c63fe1c815
-
SHA256
5fcf9491b8d73f1f90a83ee7bda9097043903ba18822f1f22eacf92338b0d619
-
SHA512
72cf714bc20660f2ab18fbcd74b84e9aa7d85fe77482ebd3b135c5c6db0dc7ab2523c418ca3ff44f301eec66742cea3c11e6c9575bf9cec90906d60a156291b0
-
SSDEEP
192:bAHD2V/OLaMD04CRS68yhpMqxauyKixCEyKKJA5es:bOC02bHR7ZpMqxnyZx90A0s
Score3/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/Mono.Cecil.dll
-
Size
350KB
-
MD5
de69bb29d6a9dfb615a90df3580d63b1
-
SHA1
74446b4dcc146ce61e5216bf7efac186adf7849b
-
SHA256
f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc
-
SHA512
6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015
-
SSDEEP
6144:jIevdbLPNYe8bikm98KXPHhOWY/fFREomhUFD3z:se1PNL+QRfBg/f/EWFD
Score1/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Builder/stub.dll
-
Size
96KB
-
MD5
625ed01fd1f2dc43b3c2492956fddc68
-
SHA1
48461ef33711d0080d7c520f79a0ec540bda6254
-
SHA256
6824c2c92eb7cee929f9c6b91e75c8c1fc3bfe80495eba4fa27118d40ad82b2b
-
SHA512
1889c7cee50092fe7a66469eb255b4013624615bac3a9579c4287bf870310bdc9018b0991f0ad7a9227c79c9bd08fd0c6fc7ebe97f21c16b7c06236f3755a665
-
SSDEEP
1536:9G6ijoigzKqO1RUTBHQsu/0igR4vYVVlmbfaxv0ujXyyedOn4iwEEl:BSElHQ/ORUYos0ujyzdZl
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Host/Kurome.Host.exe
-
Size
119KB
-
MD5
4fde0f80c408af27a8d3ddeffea12251
-
SHA1
e834291127af150ce287443c5ea607a7ae337484
-
SHA256
1b644cdb1c7247c07d810c0ea10bec34dc5600f3645589690a219de08cf2dedb
-
SHA512
3693aeaa2cc276060b899f21f6f57f435b75fec5bcd7725b2dd79043b341c12ebc29bd43b287eb22a3e31fd2b50c4fa36bf020f9f3db5e2f75fe8cc747eca5f5
-
SSDEEP
3072:KEdjrOO8+K46SgVE+mxzqT67iLRi/Gj81GUpYb:KjQjgPmxzq27iLRiuAPp
Score1/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Host/Kurome.WCF.dll
-
Size
123KB
-
MD5
e3d39e30e0cdb76a939905da91fe72c8
-
SHA1
433fc7dc929380625c8a6077d3a697e22db8ed14
-
SHA256
4bfa493b75361920e6403c3d85d91a454c16ddda89a97c425257e92b352edd74
-
SHA512
9bb3477023193496ad20b7d11357e510ba3d02b036d6f35f57d061b1fc4d0f6cb3055ae040d78232c8a732d9241699ddcfac83cc377230109bf193736d9f92b8
-
SSDEEP
3072:9mWO8dR1mB5UzPU7vdTm8pLetBD0PQbP1:g2dL8ewbJnpBe
Score1/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Kurome.Loader/Kurome.Loader.exe
-
Size
2.2MB
-
MD5
a3ec05d5872f45528bbd05aeecf0a4ba
-
SHA1
68486279c63457b0579d86cd44dd65279f22d36f
-
SHA256
d4797b2e4957c9041ba32454657f5d9a457851c6b5845a57e0e5397707e7773e
-
SHA512
b96b582bb26cb40dbb2a0709a6c88acd87242d0607d548473e3023ffa0a6c9348922a98a4948f105ea0b8224a3930af1e698c6cee3c36ca6a83df6d20c868e8e
-
SSDEEP
49152:KSmo0SdsEoRykUuulqasMwMcdZa9FHeXXGFr3sylP2/BQ7MWV:lm7UQRyksl9cXwFHeX2t8y21
Score4/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/FAQ (English).docx
-
Size
30KB
-
MD5
a973ea85439ddfe86379d47e19da4dca
-
SHA1
78f60711360ddd46849d128e7a5d1b68b1d43f9f
-
SHA256
c197833a3fd69e98fbf2b02e9da232ff2867e1e684d420fd3975188c0e0e202b
-
SHA512
4a3fad33cccb15ea2d98bc30141744ba6709afec52d429ac0916aa656f4b611fdeda4b37812f0a72b90de000fc5c0f95bb445e5df67fc4ba6f93de5ce55df510
-
SSDEEP
768:oi87zWNuZn3IZElFoL+goT2Ir9259IQ+409:oi8mQnXFoigoRr9aIvX9
Score4/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/FAQ(RUS).docx
-
Size
51KB
-
MD5
aa9534a22d08fb17b6c50164ca226aba
-
SHA1
9d68e6e4b0ea3c41ad7f70733dc53628962765ce
-
SHA256
e3f9590d0a28e8f17d40f9a5a5489a963c6d5e722a324adf0d1d666ea424c89f
-
SHA512
a4290cf0f3ecbb25078a0d3f870ed6abcab83d831e107f59730cf5fbdbc0268ac831d8f31f18a08794e27e51ba302ecb5bdd4bac85f3887844ed881c363bb8b9
-
SSDEEP
1536:YmF2FkS3yM0Yj3ePetyogAcLrANZLI3dakgXeV:YNFkGem74Lr+k3v7V
Score4/10 -
-
-
Target
Redline_20_2/Redline_20_2_stealer-main/Panel/RedLine_20_2/Panel/Panel.exe
-
Size
21.2MB
-
MD5
70f64e55852f812c8ce30b7831accf70
-
SHA1
4ee00b44ce66d871bd69c2ff4d72547953baf488
-
SHA256
61e44f8baccf9d80daa45a5b618c3faaee7b8cdedad4656eb99f49ee80f318fb
-
SHA512
98056894cbea8221af6c7b35a020348e180aefc29b87eb420f215724e5f29bac3418b7dd88dc00dfe0c5adaaffac0bd9da68f2d5dae7a724cf542198e96999eb
-
SSDEEP
393216:acc0kqRY78G0CYXRpDmbdTTia/7USGo+3rjmKr4YYH+EUWpgX:acbkVoGJMflhZ3rjB4cW6
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-