General
-
Target
6606a8bcaf5dd71559d8ba1dd6e357a6f4ff4f229ff2a9c8750142aa97fc14f8
-
Size
120KB
-
Sample
241111-f5584athnh
-
MD5
bf8acaa329c4dd99470906bd26970e96
-
SHA1
ee9e43a683b876aa7a14f6abaa4dd57d558e719f
-
SHA256
6606a8bcaf5dd71559d8ba1dd6e357a6f4ff4f229ff2a9c8750142aa97fc14f8
-
SHA512
7074fe8b6a98a059822f0874a972370e7090219e8fec68d8849134851abce29b9a33a9ff8cb07ad3e6e23f4136136b07073ffff8019d48bdd6ad86114e122329
-
SSDEEP
3072:IZ0fIRrzv9mxQWzknroYfFf4IrIbN5pNP4Vx0gKjnsKUW:BfIrJPWz8oQ+IrIbNJI0bsA
Static task
static1
Behavioral task
behavioral1
Sample
baaf32104f474e63a3796052e9c892263fa05f58edd7de8d3bccecac08107997.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
baaf32104f474e63a3796052e9c892263fa05f58edd7de8d3bccecac08107997.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
pub3
89.22.231.25:45245
-
auth_value
ffd0fd0d5630c2c573c643bde2ed50b3
Targets
-
-
Target
baaf32104f474e63a3796052e9c892263fa05f58edd7de8d3bccecac08107997
-
Size
277KB
-
MD5
6d08b98ff314f5621f656b8d0a991275
-
SHA1
4d195676dac73d4df0003cda5b29138be94821b9
-
SHA256
baaf32104f474e63a3796052e9c892263fa05f58edd7de8d3bccecac08107997
-
SHA512
a3769a130c27bdd2e9a0e66dae166b0ebcd752da51db4b49a6e87417c60e1cbbb7a841831224ba9ad44452a9a157d96133e8005ca1520843d6d7423e66336dd3
-
SSDEEP
3072:ePjx0ADKrqLOwZzoXhdWgMeEdAngc136aTm/KMoRvjR9cibZj5UnSuRnHMX:aV3EqLOq6hd6eEmbTKKrRN91bZgWX
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-