General
-
Target
c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b
-
Size
839KB
-
Sample
241111-a8bwrssjhr
-
MD5
b304b0fb07f16000438b03c792efef7b
-
SHA1
243d1d6bd113dd3816d41ffd5498499686cb2ef5
-
SHA256
c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b
-
SHA512
a00dcea909f8351f4e217b5d79e6f55ecc111d4f652b577e50b70d076d5a354119fb752b8c06844c561db2d73fc62b344c3916653523dc4d7c580828af4ddfcf
-
SSDEEP
24576:0ymvHoR0dJqCvkO7wCVMyuJK8MsiCA7PNC:DQIudJVvhTVSJK8W3P
Static task
static1
Behavioral task
behavioral1
Sample
c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Targets
-
-
Target
c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b
-
Size
839KB
-
MD5
b304b0fb07f16000438b03c792efef7b
-
SHA1
243d1d6bd113dd3816d41ffd5498499686cb2ef5
-
SHA256
c9598b35e72f346dc69571c0e3595b438086fa3167e02ec12f54626e1138289b
-
SHA512
a00dcea909f8351f4e217b5d79e6f55ecc111d4f652b577e50b70d076d5a354119fb752b8c06844c561db2d73fc62b344c3916653523dc4d7c580828af4ddfcf
-
SSDEEP
24576:0ymvHoR0dJqCvkO7wCVMyuJK8MsiCA7PNC:DQIudJVvhTVSJK8W3P
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-