General
-
Target
0b71be5a3866792ef6f5651c5c4cf4efdb164c47b37e176bba89ad75ce7c6106
-
Size
566KB
-
Sample
240810-ajameawfnl
-
MD5
e8112582b2d94ea2f5183a1efb0788cd
-
SHA1
e1fc9987eb99042a66c17e7e38b0706f08c4a7d1
-
SHA256
0b71be5a3866792ef6f5651c5c4cf4efdb164c47b37e176bba89ad75ce7c6106
-
SHA512
42db2c888fae452499e01a60061569207cda5e6ce18ba0ed9265a3f3f2f91ac25e91f6d8c60c1b2b4f6eb197dc6e0d6bc3b4924e22cb637e7ed1b57e324b5d61
-
SSDEEP
12288:v/e+Ij6ZxVBPYYsVI7/32g+I/EpfvVRsxBw/pr3dSf4Thl4AGnfwajVI9aKZe3Su:u+IGPV1YNVIb2gd5wa
Static task
static1
Behavioral task
behavioral1
Sample
0b71be5a3866792ef6f5651c5c4cf4efdb164c47b37e176bba89ad75ce7c6106.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0b71be5a3866792ef6f5651c5c4cf4efdb164c47b37e176bba89ad75ce7c6106.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
185.196.9.26:6302
Targets
-
-
Target
0b71be5a3866792ef6f5651c5c4cf4efdb164c47b37e176bba89ad75ce7c6106
-
Size
566KB
-
MD5
e8112582b2d94ea2f5183a1efb0788cd
-
SHA1
e1fc9987eb99042a66c17e7e38b0706f08c4a7d1
-
SHA256
0b71be5a3866792ef6f5651c5c4cf4efdb164c47b37e176bba89ad75ce7c6106
-
SHA512
42db2c888fae452499e01a60061569207cda5e6ce18ba0ed9265a3f3f2f91ac25e91f6d8c60c1b2b4f6eb197dc6e0d6bc3b4924e22cb637e7ed1b57e324b5d61
-
SSDEEP
12288:v/e+Ij6ZxVBPYYsVI7/32g+I/EpfvVRsxBw/pr3dSf4Thl4AGnfwajVI9aKZe3Su:u+IGPV1YNVIb2gd5wa
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-