General
-
Target
b06a18277d7e22947e0dffe785b60df415c37c3cd897f85a7adf35579e5ee3b8
-
Size
379KB
-
Sample
241110-3w6vlaxlas
-
MD5
a9d0a2cfc6eba49d62ef75fc899b5b89
-
SHA1
d65d2c85e427186d50ef6c6271d189dc6a076d39
-
SHA256
b06a18277d7e22947e0dffe785b60df415c37c3cd897f85a7adf35579e5ee3b8
-
SHA512
721812da77fac6b06302051ff40aa2962cfadb30fb3049b442e1c0daf890424e7ac94be4f25b4a97201716f11a482cfd9212dfaa065265b92b94be3c071e1de7
-
SSDEEP
6144:636IevZg5/00jO7nhD4CLPXpV77CgIXFY+chWdM04vk9b5S3YhC+Lp63kOT:636Y5/00jO7nRLZwmg0sl0iQN
Static task
static1
Behavioral task
behavioral1
Sample
b06a18277d7e22947e0dffe785b60df415c37c3cd897f85a7adf35579e5ee3b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b06a18277d7e22947e0dffe785b60df415c37c3cd897f85a7adf35579e5ee3b8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
RuzkiUNIKALNO
193.233.48.58:38989
-
auth_value
c504b04cfbdd4bf85ce6195bcb37fba6
Targets
-
-
Target
b06a18277d7e22947e0dffe785b60df415c37c3cd897f85a7adf35579e5ee3b8
-
Size
379KB
-
MD5
a9d0a2cfc6eba49d62ef75fc899b5b89
-
SHA1
d65d2c85e427186d50ef6c6271d189dc6a076d39
-
SHA256
b06a18277d7e22947e0dffe785b60df415c37c3cd897f85a7adf35579e5ee3b8
-
SHA512
721812da77fac6b06302051ff40aa2962cfadb30fb3049b442e1c0daf890424e7ac94be4f25b4a97201716f11a482cfd9212dfaa065265b92b94be3c071e1de7
-
SSDEEP
6144:636IevZg5/00jO7nhD4CLPXpV77CgIXFY+chWdM04vk9b5S3YhC+Lp63kOT:636Y5/00jO7nRLZwmg0sl0iQN
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-