General
-
Target
03c8de40b02622c643d4c91ad58aaf9d3242db9f67b6b8193900df1c4014aee1
-
Size
242KB
-
Sample
220212-flgrdshgfl
-
MD5
8ffb9dc051c6ae9b981109591779e0b9
-
SHA1
ce003bba72b8b63f95b0a12c649c47f210a360e6
-
SHA256
a030b0b0a0cf889797334ad1b220452875ac1c7ecfd1f334ee9c124befc1d920
-
SHA512
82a220fd6d1e600cf5b86f54114d2ee54beefc13d6a602ba8dbd1b6017c9d1ac1f4541d421989d54c4290fa1e5a15d98b2dba9096b96f06b175f2326c5b212b0
Static task
static1
Behavioral task
behavioral1
Sample
03c8de40b02622c643d4c91ad58aaf9d3242db9f67b6b8193900df1c4014aee1.exe
Resource
win7-en-20211208
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
-
auth_value
44e87155dd7a4d1957a956ed040ff3fd
Targets
-
-
Target
03c8de40b02622c643d4c91ad58aaf9d3242db9f67b6b8193900df1c4014aee1
-
Size
375KB
-
MD5
982b585a37095e9457f3413990798e43
-
SHA1
1bf0a97b6d313c2957d5b5125307af858975576f
-
SHA256
03c8de40b02622c643d4c91ad58aaf9d3242db9f67b6b8193900df1c4014aee1
-
SHA512
2f02da5bcba74152a7e726a8e7a0c0971e3a17aacca6de06f9a6c5005ba6057fee5e62c72f3aa4f52dc8eefcf03e3355941908d8b3433051b6baea991b807f2e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-