General
-
Target
dcf8d0e2891180df4bd80aaa2193dd38f066e2e92564e63c3e37cd75478211c2
-
Size
161KB
-
Sample
241105-mnt8tszgqk
-
MD5
77aac741eb49f30bccb579a813529b1a
-
SHA1
ef4aaff454be6aa0da31a1ae1e0061f99cf3aced
-
SHA256
dcf8d0e2891180df4bd80aaa2193dd38f066e2e92564e63c3e37cd75478211c2
-
SHA512
8bde18ec6b85f78dcf33c84fbb6ab72446b8178d2f1ef6f8524226c2cee2ab839c7577316d3d34d79654b3ef537ac0a5e4b8f909b5ff576efddbdfa61f01c301
-
SSDEEP
3072:fkR+6ptS3Iwv8BiQ/Q/HLEjzb6iTnIMc1a3K9xjUW3ZywiVW:JhN1Ksoj6i69xjUoZyFs
Static task
static1
Behavioral task
behavioral1
Sample
50ab57ec39642fb2d98e3bd5b412eb0b90db8f6c4d8c19993d534186073f1c04.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50ab57ec39642fb2d98e3bd5b412eb0b90db8f6c4d8c19993d534186073f1c04.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
pub2
89.22.231.25:45245
-
auth_value
ea9464d486a641bb513057e5f63399e1
Targets
-
-
Target
50ab57ec39642fb2d98e3bd5b412eb0b90db8f6c4d8c19993d534186073f1c04.exe
-
Size
354KB
-
MD5
c399c3d52b5dc4d60230e1da4daf358d
-
SHA1
52f59971296960fda1376f7731b797049a7965c3
-
SHA256
50ab57ec39642fb2d98e3bd5b412eb0b90db8f6c4d8c19993d534186073f1c04
-
SHA512
dd80306d9c7a6f7a1062b5834fd3ccd9b295ce021fd3ee86e8a3406811fbb6b1a2f8ac4e5a901653ad9490f5a22b01c92f234655fa6008d0aca70f153f952f3c
-
SSDEEP
6144:eLbeeki6964UMvt1M3U7AOA2Woe+yYzFQ0eh/eUfhMLa5/:AiekcWx7a0yZ0XUfAa5
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-