General
-
Target
da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a
-
Size
477KB
-
Sample
241111-c8enrstrfq
-
MD5
f4a3c1ce76636a0a57476ac2194d1250
-
SHA1
0877b529d412d09b414ef88f3010d6b9b88c27ec
-
SHA256
da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a
-
SHA512
2a219e241d60461a57db522aa47fccfd8584393c3c4b10aa485f8355c35b274195985b3fb03acfa896a43c20ad1c81f915e7925e51a339a2bbeb0ec3e9d5427a
-
SSDEEP
6144:Kjy+bnr+4p0yN90QEGK8BnRtv+znHLM0M19dBLuJsWnZrFd4YICOe/KEvAhxbAew:lMr8y90YDBRuHBnJzrf4LCH/zu8UM3/
Static task
static1
Behavioral task
behavioral1
Sample
da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a
-
Size
477KB
-
MD5
f4a3c1ce76636a0a57476ac2194d1250
-
SHA1
0877b529d412d09b414ef88f3010d6b9b88c27ec
-
SHA256
da9c9f39ebce0dceae24b0d3a1cefcd5bf95b5a41d2d49cd4b1c02cab53deb4a
-
SHA512
2a219e241d60461a57db522aa47fccfd8584393c3c4b10aa485f8355c35b274195985b3fb03acfa896a43c20ad1c81f915e7925e51a339a2bbeb0ec3e9d5427a
-
SSDEEP
6144:Kjy+bnr+4p0yN90QEGK8BnRtv+znHLM0M19dBLuJsWnZrFd4YICOe/KEvAhxbAew:lMr8y90YDBRuHBnJzrf4LCH/zu8UM3/
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-