General
-
Target
2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44
-
Size
657KB
-
Sample
241117-edt63szlfv
-
MD5
3d6832a200701888feee0bbb2dc580fb
-
SHA1
f46833d9fbf7c0df0414a4aacf2e95a3922102ad
-
SHA256
2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44
-
SHA512
7d17c63981cdcd56039b6dc15e20ac8a52eb1f799ab65bfb044ac50a3d937691f6f1e0a986a855d1a55ccb88eb718de706e6eb786f072602fd6e2a799d2838da
-
SSDEEP
12288:cMrXy90P+cWMcQC70dxGGKcs2VTKufCqAXhHxDzkFl2FOb+oJ6ZxBP:byU+cWMcQB9nsATK9qohRGcfoJkx5
Static task
static1
Behavioral task
behavioral1
Sample
2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44
-
Size
657KB
-
MD5
3d6832a200701888feee0bbb2dc580fb
-
SHA1
f46833d9fbf7c0df0414a4aacf2e95a3922102ad
-
SHA256
2f2bbc9f2e3433d8cc4f45c987b411a9955e774828ab3506e1af25ca21261f44
-
SHA512
7d17c63981cdcd56039b6dc15e20ac8a52eb1f799ab65bfb044ac50a3d937691f6f1e0a986a855d1a55ccb88eb718de706e6eb786f072602fd6e2a799d2838da
-
SSDEEP
12288:cMrXy90P+cWMcQC70dxGGKcs2VTKufCqAXhHxDzkFl2FOb+oJ6ZxBP:byU+cWMcQB9nsATK9qohRGcfoJkx5
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-