General
-
Target
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095
-
Size
474KB
-
Sample
241029-pjbl2avgmf
-
MD5
0132924603f08693b2754365a1982cfc
-
SHA1
c8f9a90879c88c0b999cb38331e4e44c99aec1dc
-
SHA256
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095
-
SHA512
9b2509a77ac24ee82933e9e093ead9418c8f80dc3bd168231350cc17f675b208e9ce6339a386d8dca9423fd3bb9df8a164c0ccb4fbff52f97a256d4b1d0315a1
-
SSDEEP
6144:Kgy+bnr+Wp0yN90QEt/ooX0LQZ2XvSDsRI1XUUhZzOpH4al9w2z5EF33Oevl9jCq:sMruy90Ld86DsYhZGvOF3/d9jCq
Static task
static1
Behavioral task
behavioral1
Sample
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095.exe
Resource
win11-20241023-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Targets
-
-
Target
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095
-
Size
474KB
-
MD5
0132924603f08693b2754365a1982cfc
-
SHA1
c8f9a90879c88c0b999cb38331e4e44c99aec1dc
-
SHA256
dc013bb782e3ceeec5507ea108401b66a55ec30f435751350fe8c4dbc7cb9095
-
SHA512
9b2509a77ac24ee82933e9e093ead9418c8f80dc3bd168231350cc17f675b208e9ce6339a386d8dca9423fd3bb9df8a164c0ccb4fbff52f97a256d4b1d0315a1
-
SSDEEP
6144:Kgy+bnr+Wp0yN90QEt/ooX0LQZ2XvSDsRI1XUUhZzOpH4al9w2z5EF33Oevl9jCq:sMruy90Ld86DsYhZGvOF3/d9jCq
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-