General
-
Target
e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794
-
Size
468KB
-
Sample
241110-v9nbeasanc
-
MD5
336f4a98848166dcc4e11af39eb941dd
-
SHA1
a091a914dd2cd4a8fa34d08e17f1f74caa444c65
-
SHA256
e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794
-
SHA512
7dba766180bf57affa02926a6501cbecca244a0a40f7c680e1915f8584a1a2f931e6728d9867d5be9112f2324868df00f4e3b4cf83c44a2d863394333ca637ce
-
SSDEEP
12288:sMr4y90NNWyppFgxIFQ4AyNbyRUegLFxE9KT7:8y4AyppCxIC0NbyzgLvE0/
Static task
static1
Behavioral task
behavioral1
Sample
e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794
-
Size
468KB
-
MD5
336f4a98848166dcc4e11af39eb941dd
-
SHA1
a091a914dd2cd4a8fa34d08e17f1f74caa444c65
-
SHA256
e84a27974fc9bf941f23d5107f9f37e6d39e14db853576b8b0fb3085be09f794
-
SHA512
7dba766180bf57affa02926a6501cbecca244a0a40f7c680e1915f8584a1a2f931e6728d9867d5be9112f2324868df00f4e3b4cf83c44a2d863394333ca637ce
-
SSDEEP
12288:sMr4y90NNWyppFgxIFQ4AyNbyRUegLFxE9KT7:8y4AyppCxIC0NbyzgLvE0/
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-