General
-
Target
6f1a03d4406726e59e091028e3962cbf4cd953b1904eea61cf7300a635e78482
-
Size
252KB
-
Sample
241104-ylpfcaynaj
-
MD5
a23ada3d7157e9032f23caf89c203e28
-
SHA1
fd50368dd5e266d9220cd639dabef88ef1b31a39
-
SHA256
6f1a03d4406726e59e091028e3962cbf4cd953b1904eea61cf7300a635e78482
-
SHA512
3df0e44571a038c7386242f1e1fe8f805ea7b1040b9ab8da59c3a6839c9c505fff1daa1538470049b5deed860f6b0d17231b392d62e3b7b8fcdf0b0f7a4caa56
-
SSDEEP
6144:dsBVlTAn65Ynf1P51bPabRE5ZwyKIY9E2Pr:dOlE5di2JKl
Static task
static1
Behavioral task
behavioral1
Sample
6f1a03d4406726e59e091028e3962cbf4cd953b1904eea61cf7300a635e78482.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
UDP
45.9.20.20:13441
Targets
-
-
Target
6f1a03d4406726e59e091028e3962cbf4cd953b1904eea61cf7300a635e78482
-
Size
252KB
-
MD5
a23ada3d7157e9032f23caf89c203e28
-
SHA1
fd50368dd5e266d9220cd639dabef88ef1b31a39
-
SHA256
6f1a03d4406726e59e091028e3962cbf4cd953b1904eea61cf7300a635e78482
-
SHA512
3df0e44571a038c7386242f1e1fe8f805ea7b1040b9ab8da59c3a6839c9c505fff1daa1538470049b5deed860f6b0d17231b392d62e3b7b8fcdf0b0f7a4caa56
-
SSDEEP
6144:dsBVlTAn65Ynf1P51bPabRE5ZwyKIY9E2Pr:dOlE5di2JKl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-