General
-
Target
2024-10-23_f324c1d8c0d086f0c340ba2ad68b9ee1_avoslocker_cobalt-strike
-
Size
577KB
-
Sample
241023-qgbppatemm
-
MD5
f324c1d8c0d086f0c340ba2ad68b9ee1
-
SHA1
ab286c6cf5cb800a54e76ea3d6cb5e0bfdf572a1
-
SHA256
1917422fc4ddd6cac828d67a6a1e17d48133ce86ba79467fd77160980a88dbf0
-
SHA512
8e9fe36dc60f828871bc242090ea946ce9543b089acecd8800979ed2a1b0f7f1ba9d7d37fd09ace0f08d5e5281d7afd6ba364ce6632250e9b3b240aac98044e0
-
SSDEEP
12288:rljR3Z64BX90Qzt/MrqQBXbRztnCjFrAcKfOVJPk0y9t9D:hR3ZNBX90QtEhbRhAxOfOVVk0yHx
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-23_f324c1d8c0d086f0c340ba2ad68b9ee1_avoslocker_cobalt-strike.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-23_f324c1d8c0d086f0c340ba2ad68b9ee1_avoslocker_cobalt-strike.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Targets
-
-
Target
2024-10-23_f324c1d8c0d086f0c340ba2ad68b9ee1_avoslocker_cobalt-strike
-
Size
577KB
-
MD5
f324c1d8c0d086f0c340ba2ad68b9ee1
-
SHA1
ab286c6cf5cb800a54e76ea3d6cb5e0bfdf572a1
-
SHA256
1917422fc4ddd6cac828d67a6a1e17d48133ce86ba79467fd77160980a88dbf0
-
SHA512
8e9fe36dc60f828871bc242090ea946ce9543b089acecd8800979ed2a1b0f7f1ba9d7d37fd09ace0f08d5e5281d7afd6ba364ce6632250e9b3b240aac98044e0
-
SSDEEP
12288:rljR3Z64BX90Qzt/MrqQBXbRztnCjFrAcKfOVJPk0y9t9D:hR3ZNBX90QtEhbRhAxOfOVVk0yHx
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-