General
-
Target
5f272f7d5d267070268758daedf8722a3363c3e3fd8bfe3cd80a71979e78248f
-
Size
420KB
-
Sample
241104-yqcx4swekg
-
MD5
49560d64a1d61aab69542640116cdb04
-
SHA1
dc03b1cc6138cac01bd6a1e72a4e04050fe5c019
-
SHA256
5f272f7d5d267070268758daedf8722a3363c3e3fd8bfe3cd80a71979e78248f
-
SHA512
8abd3b0276d4f33b40e033e53789585f8ec8e65d7f97ba60ad5444675c45d4a1db5f178574ae3b5c984a3b9a3dd45f203f00308e77d505e816cebc01c0622a1b
-
SSDEEP
6144:5tyIPVpSMPCGH4iFhMrWapo3XRqvF3/BTn/JJBz3DCugMucbcLaegv0VuwO4/e9J:pPPPblhMNpggFzJdzBg1paezEw1Yt4FM
Static task
static1
Behavioral task
behavioral1
Sample
3d71a074cc00be7e430cd12e694bf4188d09c5abf638705de00334a579870455.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d71a074cc00be7e430cd12e694bf4188d09c5abf638705de00334a579870455.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
@masyana_LZT
185.82.126.114:31858
Targets
-
-
Target
3d71a074cc00be7e430cd12e694bf4188d09c5abf638705de00334a579870455
-
Size
422KB
-
MD5
500850acce07397c1058b3cbbf85e821
-
SHA1
49fdcd1c813e49e4f2db4dfa132cb9f8334b60d3
-
SHA256
3d71a074cc00be7e430cd12e694bf4188d09c5abf638705de00334a579870455
-
SHA512
3fa1796cdbee990bb285dc64d5905d8d90fab5310606b22d615395cf90609b9157d201edb883df3c24d6ce346c625d4a72bc96bfe4dcfbd6b771c840db7dd903
-
SSDEEP
12288:maAKNGaI2KQxLKtC+IgDZMODGxkEtQKSmS3IPGZghtU:3AEG12KQxOUMDZnDvKSj3ImQtU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-