General
-
Target
ceedf0469783ec4ca42957bb1e66cacd270a6dc16fc845e0cdef7b3d7c3b58c5
-
Size
324KB
-
Sample
241111-cfxc4syrfw
-
MD5
88ac87ab3e33259e696f2b1a379c17b2
-
SHA1
7a0886f7c6219e8d3bac9644ea6459c555298d19
-
SHA256
ceedf0469783ec4ca42957bb1e66cacd270a6dc16fc845e0cdef7b3d7c3b58c5
-
SHA512
20e2a37cc077f651e9eb394e403b24f26fd4768d43aca2ffb692d836327bf9eb4d8ce20ec8dab5ce6dc51134c965a58270bbc09ca760e462a02493f45e465c13
-
SSDEEP
6144:BTczIkwEr9+f7+XetjlkUa5TzmqPGV2TIvEHclZ+xcBIXak+V50yu0:BTjkZrITrnkCqPGV2/8lECCXak05hu0
Static task
static1
Behavioral task
behavioral1
Sample
ba55ad4b1455f5cad686bf4ca883577dc98ebc05fffd79c7bc104e9304c181c0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ba55ad4b1455f5cad686bf4ca883577dc98ebc05fffd79c7bc104e9304c181c0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
@retr11k
zumbemclat.xyz:81
-
auth_value
fed6a2ebe9a9652e2caca70aff44bfb9
Targets
-
-
Target
ba55ad4b1455f5cad686bf4ca883577dc98ebc05fffd79c7bc104e9304c181c0
-
Size
833KB
-
MD5
439786cfa948f5ca38d3d269fb674da5
-
SHA1
6b8b09fdbe20f6a78db952faad120e60204b786e
-
SHA256
ba55ad4b1455f5cad686bf4ca883577dc98ebc05fffd79c7bc104e9304c181c0
-
SHA512
bfd58d8c3567b715bfebdfa12ae5b4c050b55fe6b39d63a277faaba70866b3c38f6a2f1f950f0b77b02a7c187e139e3849ac318d73f04e2dfe8c9246b4cf325b
-
SSDEEP
6144:Iuv+WQbU/SUgJ4v84B/wb9QyaVvQBc6FqOMRc5Sw2yhbxKXW4t+oLelfl3mymGCM:DvoKPgJd/FwI5bxhoLeL3mbGr3nT3
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of SetThreadContext
-