General
-
Target
9094ecee99d5dfd99d2031d1b99466f73cf568c378611a5473052d1aeed759b7.exe
-
Size
839KB
-
Sample
241112-pe8e7svrbj
-
MD5
f137680bcb57f1525e3c6e21225d58b9
-
SHA1
c73fb1199f3a586603a082b11dfc230771012027
-
SHA256
9094ecee99d5dfd99d2031d1b99466f73cf568c378611a5473052d1aeed759b7
-
SHA512
8c3e888229584c05ecabde852b63eee0d4316a3007b7956f26eaa28e468e37c7d703993120db894fe11a1862fd143e30366192e62cc43db646a78e5cefc0a702
-
SSDEEP
12288:WMrry9060V6EVq03sOs01Df04/sHOMrvefNHqigCq7FGzzZNYpA+MC:JyuVrls01704kHOM6oCI0zz9zC
Static task
static1
Behavioral task
behavioral1
Sample
9094ecee99d5dfd99d2031d1b99466f73cf568c378611a5473052d1aeed759b7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
9094ecee99d5dfd99d2031d1b99466f73cf568c378611a5473052d1aeed759b7.exe
-
Size
839KB
-
MD5
f137680bcb57f1525e3c6e21225d58b9
-
SHA1
c73fb1199f3a586603a082b11dfc230771012027
-
SHA256
9094ecee99d5dfd99d2031d1b99466f73cf568c378611a5473052d1aeed759b7
-
SHA512
8c3e888229584c05ecabde852b63eee0d4316a3007b7956f26eaa28e468e37c7d703993120db894fe11a1862fd143e30366192e62cc43db646a78e5cefc0a702
-
SSDEEP
12288:WMrry9060V6EVq03sOs01Df04/sHOMrvefNHqigCq7FGzzZNYpA+MC:JyuVrls01704kHOM6oCI0zz9zC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-