General
-
Target
33e4d906579d1842adbddc6e3be27b5b
-
Size
184KB
-
Sample
210825-p2zmw3z8yx
-
MD5
33e4d906579d1842adbddc6e3be27b5b
-
SHA1
9cc464b63f810e929cbb383de751bcac70d22020
-
SHA256
b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815
-
SHA512
4c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798
Static task
static1
Behavioral task
behavioral1
Sample
33e4d906579d1842adbddc6e3be27b5b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
33e4d906579d1842adbddc6e3be27b5b.exe
Resource
win10v20210408
Malware Config
Extracted
redline
3
deyrolorme.xyz:80
xariebelal.xyz:80
anihelardd.xyz:80
Targets
-
-
Target
33e4d906579d1842adbddc6e3be27b5b
-
Size
184KB
-
MD5
33e4d906579d1842adbddc6e3be27b5b
-
SHA1
9cc464b63f810e929cbb383de751bcac70d22020
-
SHA256
b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815
-
SHA512
4c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-