General
-
Target
7edf5917c924adeaa5f5453b09b80c6b4d8242f9a447ac0662c109ddcb62642e
-
Size
410KB
-
Sample
241104-ypjz2awgqq
-
MD5
be4558e2ae5c11663468b3e057963ede
-
SHA1
2500f713ff2eea31a149e758561f91b25245308d
-
SHA256
7edf5917c924adeaa5f5453b09b80c6b4d8242f9a447ac0662c109ddcb62642e
-
SHA512
88d48e40b873ef74766ac6fdb2c5074eb92a3ca41642773abba337ecda3f65162ea10ec057332e7a940651ddee9d02f1f07a6ec6172007548fd44673e7f555bc
-
SSDEEP
6144:K2BIkkvbt9463GaUtzb9WagCPZCaxgMqMEs9EUdKdYChblJTzvS+msS3:K2Wzhuh9/ZPVjBlCUdKdYChv/vPs
Static task
static1
Behavioral task
behavioral1
Sample
7edf5917c924adeaa5f5453b09b80c6b4d8242f9a447ac0662c109ddcb62642e.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
UDP
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Targets
-
-
Target
7edf5917c924adeaa5f5453b09b80c6b4d8242f9a447ac0662c109ddcb62642e
-
Size
410KB
-
MD5
be4558e2ae5c11663468b3e057963ede
-
SHA1
2500f713ff2eea31a149e758561f91b25245308d
-
SHA256
7edf5917c924adeaa5f5453b09b80c6b4d8242f9a447ac0662c109ddcb62642e
-
SHA512
88d48e40b873ef74766ac6fdb2c5074eb92a3ca41642773abba337ecda3f65162ea10ec057332e7a940651ddee9d02f1f07a6ec6172007548fd44673e7f555bc
-
SSDEEP
6144:K2BIkkvbt9463GaUtzb9WagCPZCaxgMqMEs9EUdKdYChblJTzvS+msS3:K2Wzhuh9/ZPVjBlCUdKdYChv/vPs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-