General
-
Target
b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b
-
Size
480KB
-
Sample
241105-w4tfxaxanp
-
MD5
1111301007c919576925646496c19986
-
SHA1
9f84d3ef844e593cd465a2ae1ece9c243f32d63b
-
SHA256
b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b
-
SHA512
6161ed45c92d143f80dd51c9efec30d740afceda390a24ca90085f4af57ca0c308158c611b771a06c5febef51f113d7b0861f48b100dd8f75f800423f5b2b810
-
SSDEEP
6144:Khy+bnr+Jp0yN90QELPIeD+OCt9V5i+Si4U1EnpGoW3/GkGeUKNXolWtR1QoTf:rMr1y90RIi7I9DSi46xoW3/vGeHXo8f
Static task
static1
Behavioral task
behavioral1
Sample
b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b
-
Size
480KB
-
MD5
1111301007c919576925646496c19986
-
SHA1
9f84d3ef844e593cd465a2ae1ece9c243f32d63b
-
SHA256
b053d4860a6ccd3e008b6c3f4ca1b4462e8acdfb114168705eb10b53d8ce477b
-
SHA512
6161ed45c92d143f80dd51c9efec30d740afceda390a24ca90085f4af57ca0c308158c611b771a06c5febef51f113d7b0861f48b100dd8f75f800423f5b2b810
-
SSDEEP
6144:Khy+bnr+Jp0yN90QELPIeD+OCt9V5i+Si4U1EnpGoW3/GkGeUKNXolWtR1QoTf:rMr1y90RIi7I9DSi46xoW3/vGeHXo8f
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-