General
-
Target
48fe3315c96adabf3b7dd6ab6dfbe14ead8391d3
-
Size
116KB
-
Sample
241110-rvwsfsydkl
-
MD5
7e17cb1d74d833ae8a8d9f9324c05e4a
-
SHA1
48fe3315c96adabf3b7dd6ab6dfbe14ead8391d3
-
SHA256
52e772bbf753a05a4b0d400bf8748be39861cf5eb0d393abe89d0c64f85b5f3c
-
SHA512
122bf215e5c87b9fdcce9296f775f9a94f4195d0a8fd6caa37cd3f8568c0212aa0043220a5517381724f92ec4f0f4dc11c71b10e8a437b8c545c91c726f893b4
-
SSDEEP
3072:L4rTwvyVP6LDxFoqiJUVyCJ30mHZlidMA2Ko8us8gdJkz300fOpU:L4rTBP6boqQUVySRZlW2KzF0fL
Static task
static1
Behavioral task
behavioral1
Sample
c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
4
176.124.201.56:25784
-
auth_value
1f101d9c1105a19254187500b2403d48
Targets
-
-
Target
c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b.exe
-
Size
282KB
-
MD5
df9005eaec4232a802cb205ddafce262
-
SHA1
90a545934efd744c7314d90d749f7249ddc40011
-
SHA256
c0ae5ad78fe90fa72242ac2596b1a59c5d0284124351812ffaff05b49bcd388b
-
SHA512
e1f61d7280f58c68c823ee82d74ffa56a7d59ac229754a39721f9396bdc2a9b5ddc29ac927fb4618cd8fe6387392f9bee20f79f8047741f8b9cac662e91dd4e7
-
SSDEEP
6144:7pLDN9eNbG2OeBdfvcMtamj7EVYDWKgoAK0lT:7pLDN9eM27/qQW8ANl
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-