General
-
Target
b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b
-
Size
239KB
-
Sample
241106-src2ls1rcs
-
MD5
1fd88377fd2ed6862150b8d3b8891de7
-
SHA1
be72057883b0f318021ee77e17562ec92f0244f5
-
SHA256
b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b
-
SHA512
c723144871cc25b08765fe3061307dca9265e2ee2f2e1db93abdaa66f6c8dd765cdba22d7d39d1d174b7885224b64747332a0192989634ba5f1fa7e4de927ddc
-
SSDEEP
3072:OBPv9kWa1bxX08a7dNfY+DDI9tjk5D3j7eW6Vx5MfFKxOr0O:O12X08anBIvjkxTKW1fFMO
Static task
static1
Behavioral task
behavioral1
Sample
b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
UDP
45.9.20.20:13441
Targets
-
-
Target
b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b
-
Size
239KB
-
MD5
1fd88377fd2ed6862150b8d3b8891de7
-
SHA1
be72057883b0f318021ee77e17562ec92f0244f5
-
SHA256
b13c7d6b392a723d8acd9d752386c91d2918fc95ae962ec94649bd462ba3f77b
-
SHA512
c723144871cc25b08765fe3061307dca9265e2ee2f2e1db93abdaa66f6c8dd765cdba22d7d39d1d174b7885224b64747332a0192989634ba5f1fa7e4de927ddc
-
SSDEEP
3072:OBPv9kWa1bxX08a7dNfY+DDI9tjk5D3j7eW6Vx5MfFKxOr0O:O12X08anBIvjkxTKW1fFMO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-