General
-
Target
5c8c4ce7ffff39f1c003c1b734f2325fe6694c6b06063f50d3b694e3a81f51c8
-
Size
178KB
-
Sample
241109-es5w5axekm
-
MD5
f74cabcfccea4e945ae3234ff13bb50a
-
SHA1
1119a5bf7a57df5f814c8d0e66c62010123fb041
-
SHA256
5c8c4ce7ffff39f1c003c1b734f2325fe6694c6b06063f50d3b694e3a81f51c8
-
SHA512
da03f1d5d674c364f5987e5eeb06b3e9e79f0ecab733d5ecea327df740c8c2961c621fb52f1c2c78b55f4032d69eaa06e5bee32f700197c797154b04ac875f48
-
SSDEEP
3072:7T31hRPIWAYDJpcasU4gk2IJFeuYD2YDrXzdHltqtPsDcj440oYQAq6jbpA2:7TJPDX432yVYDpDnYUcj/0jQ23pD
Static task
static1
Behavioral task
behavioral1
Sample
7067d56123fd38d9b61b9c7609ef5c9f6cec04b61f1d5683fc9756242361bdf3.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
@Piffik
185.224.132.232:64354
Targets
-
-
Target
7067d56123fd38d9b61b9c7609ef5c9f6cec04b61f1d5683fc9756242361bdf3
-
Size
586KB
-
MD5
f5a3f3e026d1bf1fde88dc5441e12fef
-
SHA1
8f21aff635e32661f89f78fd629377ebd9052975
-
SHA256
7067d56123fd38d9b61b9c7609ef5c9f6cec04b61f1d5683fc9756242361bdf3
-
SHA512
c55f1cbad578b614ed4cde698dd280a910f0da90d8004e7472c118701c52c919dbb20f84153225823c9379166547091ddc9a60b05e9d2127edccd1949d13eb3f
-
SSDEEP
12288:wkZ2zL5eA1GoPRkiQKLqvBIbfVLlbO/47FKGy+8:gT13X
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-