General
-
Target
ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897
-
Size
477KB
-
Sample
241111-bg2tjsyfrp
-
MD5
f6a97833be5957a763d3213a78e5f10f
-
SHA1
f8671d44e9aa41a8f49b56dec11109c809f433ac
-
SHA256
ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897
-
SHA512
dc59df0f5069ece9c37528b8d7884d2995178d142175a7def0ba0039d5e27075a2adf736d541029af1eebefc5d729e45d0e7b05cc89b0a6fa747a1f9b0e454e6
-
SSDEEP
6144:KXy+bnr+Rp0yN90QELHkHNTmH5IdYbwmBkGdZSQvbFqQf+rbSlJEkbB9ztPgT:NMr5y90xHmNTmH5GYEmhmkbreyFjYT
Static task
static1
Behavioral task
behavioral1
Sample
ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897
-
Size
477KB
-
MD5
f6a97833be5957a763d3213a78e5f10f
-
SHA1
f8671d44e9aa41a8f49b56dec11109c809f433ac
-
SHA256
ef578a1308c42df1acddb595d1e389020004ed66759a67f96afee290015ff897
-
SHA512
dc59df0f5069ece9c37528b8d7884d2995178d142175a7def0ba0039d5e27075a2adf736d541029af1eebefc5d729e45d0e7b05cc89b0a6fa747a1f9b0e454e6
-
SSDEEP
6144:KXy+bnr+Rp0yN90QELHkHNTmH5IdYbwmBkGdZSQvbFqQf+rbSlJEkbB9ztPgT:NMr5y90xHmNTmH5GYEmhmkbreyFjYT
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-