General
-
Target
e91a7aa798e0be3529e317499d0b8d62f5908e5b
-
Size
289KB
-
Sample
241110-zzsklaykgj
-
MD5
33fa01402b74d2b10f4314207d300251
-
SHA1
e91a7aa798e0be3529e317499d0b8d62f5908e5b
-
SHA256
591acaec4430ae2f7cd61b3bfb633652fdc36e38956a3183d58b6bbf2a3d90b2
-
SHA512
0af96c1f695ea881764b80b75ce1a84aa4e1bbc5a78f959abc721bfa8ee5308c07742127f8aaf1c62ba7fb1288ba4433b92a05df00d9801c248053212df2cb63
-
SSDEEP
6144:k1o6jEYdtBX1joEi+AO7CEgHq4IcO9I9pYw3C:k1VjE4rxcdC
Static task
static1
Behavioral task
behavioral1
Sample
e91a7aa798e0be3529e317499d0b8d62f5908e5b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e91a7aa798e0be3529e317499d0b8d62f5908e5b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
REDLINEVIP (TG: @Fatherofcarders) 150K
178.32.215.163:17189
-
auth_value
0f7b7a0ecd1083169a37fc5d6e242919
Targets
-
-
Target
e91a7aa798e0be3529e317499d0b8d62f5908e5b
-
Size
289KB
-
MD5
33fa01402b74d2b10f4314207d300251
-
SHA1
e91a7aa798e0be3529e317499d0b8d62f5908e5b
-
SHA256
591acaec4430ae2f7cd61b3bfb633652fdc36e38956a3183d58b6bbf2a3d90b2
-
SHA512
0af96c1f695ea881764b80b75ce1a84aa4e1bbc5a78f959abc721bfa8ee5308c07742127f8aaf1c62ba7fb1288ba4433b92a05df00d9801c248053212df2cb63
-
SSDEEP
6144:k1o6jEYdtBX1joEi+AO7CEgHq4IcO9I9pYw3C:k1VjE4rxcdC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of SetThreadContext
-