General
-
Target
4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe
-
Size
839KB
-
Sample
241112-q1gp2stflg
-
MD5
2eccb85e20ad715b45f1789cd5cda2ed
-
SHA1
0ec9820d975ed23a55713ed006162eebd39db07e
-
SHA256
494778ecd2bb10d56f988c137352df14347a73ae9b18712e7c2efbd9b5954686
-
SHA512
4a07e3b5a07f7c0c6faac4d1a53bb73295405a946faddedf15034db2a1d1dcadd51c4e9184bdff586b972cd49d7b52bee82228ed45b90b1ee17f3ae897597f9d
-
SSDEEP
12288:WMrry9060V6EVq03sOs01Df04/sHOMrvefNHqigCq7FGzzZNYpA+Mv:JyuVrls01704kHOM6oCI0zz9zv
Static task
static1
Behavioral task
behavioral1
Sample
4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
4e53245dab6c6907bbef1e4dc596cdc91baa0407e5880275d5ad7f542b64324bN.exe
-
Size
839KB
-
MD5
2eccb85e20ad715b45f1789cd5cda2ed
-
SHA1
0ec9820d975ed23a55713ed006162eebd39db07e
-
SHA256
494778ecd2bb10d56f988c137352df14347a73ae9b18712e7c2efbd9b5954686
-
SHA512
4a07e3b5a07f7c0c6faac4d1a53bb73295405a946faddedf15034db2a1d1dcadd51c4e9184bdff586b972cd49d7b52bee82228ed45b90b1ee17f3ae897597f9d
-
SSDEEP
12288:WMrry9060V6EVq03sOs01Df04/sHOMrvefNHqigCq7FGzzZNYpA+Mv:JyuVrls01704kHOM6oCI0zz9zv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-