General
-
Target
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69
-
Size
839KB
-
Sample
241111-cyxfts1cpc
-
MD5
d5618df7549a93341823b3d0c276ff46
-
SHA1
d942ab0867e770f29c69ef95366e86c95f861cd0
-
SHA256
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69
-
SHA512
073bb3407669e8bbdedd02bcfc6059bf3c76770ff0cd3866342ec1a62a29976240fc4467d4b31c1ff2a4a2f33161aa9a3088a533ebe12e2bba9eb0771de5f850
-
SSDEEP
12288:KMrdy90RJy1j+1OS1ekd+Cyom938NOfrO2CuHHKaGEQNe239ZrTUdUKWZz15k5sC:7yYyj+8Vlb93IOfFnHqJc6ZmUKwQKC
Static task
static1
Behavioral task
behavioral1
Sample
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69
-
Size
839KB
-
MD5
d5618df7549a93341823b3d0c276ff46
-
SHA1
d942ab0867e770f29c69ef95366e86c95f861cd0
-
SHA256
1051b63ee8d8ece1acbaf428ee72063404bdd44563ec96d0e150e5bbdaa32a69
-
SHA512
073bb3407669e8bbdedd02bcfc6059bf3c76770ff0cd3866342ec1a62a29976240fc4467d4b31c1ff2a4a2f33161aa9a3088a533ebe12e2bba9eb0771de5f850
-
SSDEEP
12288:KMrdy90RJy1j+1OS1ekd+Cyom938NOfrO2CuHHKaGEQNe239ZrTUdUKWZz15k5sC:7yYyj+8Vlb93IOfFnHqJc6ZmUKwQKC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-