General
-
Target
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4
-
Size
589KB
-
Sample
241110-1kv8lsvpdy
-
MD5
f55a2ac9b8b8b367edf480a6d28b28f1
-
SHA1
4a1106b3aa08b58cd6c1385afbe5e9672102c059
-
SHA256
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4
-
SHA512
934a78f241586e65d69fb5f177fa26af7e13191dfc731773e0b6f3c11d63329e8319cc23ffe2102160c52078031ac701c3d8adba0b265598f64246ca18753822
-
SSDEEP
12288:BMr1y90OlIo7NOFrOgOug766KhjbAHUdjgOU82uG:MyF57NOFJO5KpZd8F82uG
Static task
static1
Behavioral task
behavioral1
Sample
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Targets
-
-
Target
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4
-
Size
589KB
-
MD5
f55a2ac9b8b8b367edf480a6d28b28f1
-
SHA1
4a1106b3aa08b58cd6c1385afbe5e9672102c059
-
SHA256
3d9a18e09c1146887f4c1214aa722a5571a9ffc741a40f4cc5e22a97e5bbedd4
-
SHA512
934a78f241586e65d69fb5f177fa26af7e13191dfc731773e0b6f3c11d63329e8319cc23ffe2102160c52078031ac701c3d8adba0b265598f64246ca18753822
-
SSDEEP
12288:BMr1y90OlIo7NOFrOgOug766KhjbAHUdjgOU82uG:MyF57NOFJO5KpZd8F82uG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-