General
-
Target
https://mega.nz/file/a1tDEAjJ#3JZZnt-xJSIP74QYyIEOb5jv8Sfdcu5gDFdJJfJQAb8
-
Sample
250218-t2hwaavny2
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/a1tDEAjJ#3JZZnt-xJSIP74QYyIEOb5jv8Sfdcu5gDFdJJfJQAb8
Resource
win10ltsc2021-20250217-en
22 signatures
900 seconds
Behavioral task
behavioral2
Sample
https://mega.nz/file/a1tDEAjJ#3JZZnt-xJSIP74QYyIEOb5jv8Sfdcu5gDFdJJfJQAb8
Resource
win11-20250218-en
0 signatures
900 seconds
Malware Config
Extracted
Family
redline
C2
65.108.29.210:21638
Attributes
-
auth_value
ad39d6a8ea7823f2a92f57ebaa4c98a5
Targets
-
-
Target
https://mega.nz/file/a1tDEAjJ#3JZZnt-xJSIP74QYyIEOb5jv8Sfdcu5gDFdJJfJQAb8
Score10/10-
Gurcu family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-