General
-
Target
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d
-
Size
760KB
-
Sample
241110-zs8cgavjgw
-
MD5
57f6231b519552d31b66c55faf263053
-
SHA1
20be74bdea71d56de0595e93ab6e870ca8aff2d6
-
SHA256
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d
-
SHA512
ef495d39607376295d71b52b7a70b155ec1d1fa6dc4d54638293a9b4d0381cc99cc02964321b7c9cafd1b7e197c41e48c101e089dd73981401dfc75fc7432a2c
-
SSDEEP
12288:uMrfy90JINSKI44cT7jVn1+aLznZe4KBQ9IAymn8wDYevZ43V9MZR6XnES:ByXW4tDV1ZZCBQ9IAymFDDvZq3MZRInL
Static task
static1
Behavioral task
behavioral1
Sample
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d
-
Size
760KB
-
MD5
57f6231b519552d31b66c55faf263053
-
SHA1
20be74bdea71d56de0595e93ab6e870ca8aff2d6
-
SHA256
dbe41b6ad0ef75510a542bd3d168d4f9b4d4587d300fc29bdac57823ce57516d
-
SHA512
ef495d39607376295d71b52b7a70b155ec1d1fa6dc4d54638293a9b4d0381cc99cc02964321b7c9cafd1b7e197c41e48c101e089dd73981401dfc75fc7432a2c
-
SSDEEP
12288:uMrfy90JINSKI44cT7jVn1+aLznZe4KBQ9IAymn8wDYevZ43V9MZR6XnES:ByXW4tDV1ZZCBQ9IAymFDDvZq3MZRInL
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-