General
-
Target
bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc
-
Size
468KB
-
Sample
241108-b4xhcasejk
-
MD5
af8a16fdf36d4728e96ebe6aa73a4251
-
SHA1
02dc804db02e259fbce65ed374bbede5205d586e
-
SHA256
bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc
-
SHA512
d6cca4e103451aed0485bc58fb5c88a008ef7ceaba11753069fbfb06bfec3009282570a7fd40df53278cbe1b7323beb9da4c65a196366859251b9d5abd47d314
-
SSDEEP
6144:K4y+bnr+op0yN90QErZGR62dNLq4DTA1JyVa+VZILwqgAPefuJre11wUZuBJCS+i:0MrQy90b8HvTAPwql7JrWGUYm59s
Static task
static1
Behavioral task
behavioral1
Sample
bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc
-
Size
468KB
-
MD5
af8a16fdf36d4728e96ebe6aa73a4251
-
SHA1
02dc804db02e259fbce65ed374bbede5205d586e
-
SHA256
bae94a1eb9bb5509e1c455d3699930eb3691a35730915b9351987bee992a27bc
-
SHA512
d6cca4e103451aed0485bc58fb5c88a008ef7ceaba11753069fbfb06bfec3009282570a7fd40df53278cbe1b7323beb9da4c65a196366859251b9d5abd47d314
-
SSDEEP
6144:K4y+bnr+op0yN90QErZGR62dNLq4DTA1JyVa+VZILwqgAPefuJre11wUZuBJCS+i:0MrQy90b8HvTAPwql7JrWGUYm59s
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-