General
-
Target
d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e
-
Size
705KB
-
Sample
211025-a5daesfde9
-
MD5
86af5af8529d3b9c76cdc76f6962f849
-
SHA1
9ba293fed7868e48ecfa6c8b4e0ab14c2630a98e
-
SHA256
d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e
-
SHA512
a7a78f3df79b9f703d2e6bae988781f4d4a097cb8cdf16c68272a603e107d2d7bd5ab975b44116f54c84692ba41b4dbd51b99caa1b47db9ba5c7fd15e1cd449e
Static task
static1
Behavioral task
behavioral1
Sample
d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e.exe
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e
-
Size
705KB
-
MD5
86af5af8529d3b9c76cdc76f6962f849
-
SHA1
9ba293fed7868e48ecfa6c8b4e0ab14c2630a98e
-
SHA256
d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e
-
SHA512
a7a78f3df79b9f703d2e6bae988781f4d4a097cb8cdf16c68272a603e107d2d7bd5ab975b44116f54c84692ba41b4dbd51b99caa1b47db9ba5c7fd15e1cd449e
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-