General
-
Target
48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145N.exe
-
Size
202KB
-
Sample
241112-y8dx5atnbr
-
MD5
091c713abe2a857856740a49835b9300
-
SHA1
c1a26d5de4c3ba0fd235d108095adeee9132b88f
-
SHA256
48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145
-
SHA512
b7201a6da8eb068a14ee8096f507e9cd2e15ca79d479df8af948569c14288240c5a9b2b41ffd5002f96d24c8ade3f4e0161f64f306bf46a5bb30e63723efffdc
-
SSDEEP
3072:Kpy+bnr+O1c5GWp1icKAArDZz4N9GhbkrNEk6t6KobmnVgAmhu4mNP9ZirlYn:Kpy+bnr+Hp0yN90QEiKVgWdjiO
Static task
static1
Behavioral task
behavioral1
Sample
48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145N.exe
-
Size
202KB
-
MD5
091c713abe2a857856740a49835b9300
-
SHA1
c1a26d5de4c3ba0fd235d108095adeee9132b88f
-
SHA256
48e290ea455726f26f6ce1cf01d8c255fbf3bbee69f418b7318a556ba8a5a145
-
SHA512
b7201a6da8eb068a14ee8096f507e9cd2e15ca79d479df8af948569c14288240c5a9b2b41ffd5002f96d24c8ade3f4e0161f64f306bf46a5bb30e63723efffdc
-
SSDEEP
3072:Kpy+bnr+O1c5GWp1icKAArDZz4N9GhbkrNEk6t6KobmnVgAmhu4mNP9ZirlYn:Kpy+bnr+Hp0yN90QEiKVgWdjiO
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-