General
-
Target
a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7
-
Size
714KB
-
Sample
241111-bg8bbsyfrq
-
MD5
e0dc655fb225f7e0734cf4224f892441
-
SHA1
f9e35cf316ed1dce67f9d8e0cdcf9af4a0f584ff
-
SHA256
a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7
-
SHA512
56d8b35060717a70f36fccda8be4d64269ee8efa2b584f4aeb98c22247e92f57740d3091d23622d6eac6463392efd27240de22eb52265e14d07483b6c7bbcbcf
-
SSDEEP
12288:FMrsy90OQPCHZTruOGXEZS1F9nHNJMD5eE556D8KudzHwToMfUna3E23602:RyxQP8ZTGXEZ4FxED4E5E9udTwTocp36
Static task
static1
Behavioral task
behavioral1
Sample
a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7
-
Size
714KB
-
MD5
e0dc655fb225f7e0734cf4224f892441
-
SHA1
f9e35cf316ed1dce67f9d8e0cdcf9af4a0f584ff
-
SHA256
a6f79eb0e148f13c05eaf9d673534559118ff03286cb5b7b0ab9f4bb538be1f7
-
SHA512
56d8b35060717a70f36fccda8be4d64269ee8efa2b584f4aeb98c22247e92f57740d3091d23622d6eac6463392efd27240de22eb52265e14d07483b6c7bbcbcf
-
SSDEEP
12288:FMrsy90OQPCHZTruOGXEZS1F9nHNJMD5eE556D8KudzHwToMfUna3E23602:RyxQP8ZTGXEZ4FxED4E5E9udTwTocp36
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-