General
-
Target
4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4.exe
-
Size
157KB
-
Sample
241123-ktezzsskax
-
MD5
b5af483aba699bdc47d8a16fb9bb445e
-
SHA1
9bb3df0fb4cd4444bae37905ee935e0f2b86b849
-
SHA256
4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4
-
SHA512
a03cbc530f8bf253e86f3204497bf5716f9f1241112ff42997b1cd6c1d61b785f0480e26e52054f1aad5e9a48be6e224d3b30f100c5ad1739363fb7d5e16248c
-
SSDEEP
3072:v6qHUrQdS8G8B+JfNUfDnZZC4aSOHiE3pxce:iq0t83CUfDZkp
Static task
static1
Behavioral task
behavioral1
Sample
4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4.exe
Resource
win7-20241010-en
Malware Config
Extracted
redline
141.94.188.138:46419
-
auth_value
3f48b95855158031ae9e7dafcb203009
Targets
-
-
Target
4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4.exe
-
Size
157KB
-
MD5
b5af483aba699bdc47d8a16fb9bb445e
-
SHA1
9bb3df0fb4cd4444bae37905ee935e0f2b86b849
-
SHA256
4ab66fe4d4da4a14a28a3d2bc3a525cee18fc6a39176332817b3ea43f0beb9f4
-
SHA512
a03cbc530f8bf253e86f3204497bf5716f9f1241112ff42997b1cd6c1d61b785f0480e26e52054f1aad5e9a48be6e224d3b30f100c5ad1739363fb7d5e16248c
-
SSDEEP
3072:v6qHUrQdS8G8B+JfNUfDnZZC4aSOHiE3pxce:iq0t83CUfDZkp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-