General
-
Target
fdb6cd4503263f0a42ee363e0d3d1c7b2b08ee1ed486ea33410d4abb93e71c57
-
Size
146KB
-
Sample
241126-gzy39sylfy
-
MD5
492eccc12152f7a69459e0a989196a27
-
SHA1
04baa6fe5fea028fce0cc8862b9a85ac2f2fb3b9
-
SHA256
fdb6cd4503263f0a42ee363e0d3d1c7b2b08ee1ed486ea33410d4abb93e71c57
-
SHA512
34b8e7d7c9041938dc1cef90fd9589a697c41b45c945795ff25dab847f5f0ad8e3ff9fa434c92a29dc0526ca45fed76b03b9e8826b7bb0ac8a91d491aa278307
-
SSDEEP
3072:GrsTGICBZ0kwjzgWY+ouXpJnrFFChXeBoqXCytPERGEvz:w90kQFY+TfnrKhXeBhX6
Static task
static1
Behavioral task
behavioral1
Sample
fdb6cd4503263f0a42ee363e0d3d1c7b2b08ee1ed486ea33410d4abb93e71c57.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
65.108.29.210:21638
-
auth_value
ad39d6a8ea7823f2a92f57ebaa4c98a5
Targets
-
-
Target
fdb6cd4503263f0a42ee363e0d3d1c7b2b08ee1ed486ea33410d4abb93e71c57
-
Size
146KB
-
MD5
492eccc12152f7a69459e0a989196a27
-
SHA1
04baa6fe5fea028fce0cc8862b9a85ac2f2fb3b9
-
SHA256
fdb6cd4503263f0a42ee363e0d3d1c7b2b08ee1ed486ea33410d4abb93e71c57
-
SHA512
34b8e7d7c9041938dc1cef90fd9589a697c41b45c945795ff25dab847f5f0ad8e3ff9fa434c92a29dc0526ca45fed76b03b9e8826b7bb0ac8a91d491aa278307
-
SSDEEP
3072:GrsTGICBZ0kwjzgWY+ouXpJnrFFChXeBoqXCytPERGEvz:w90kQFY+TfnrKhXeBhX6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-