General
-
Target
ea04b52d08b0882cc0f24dd393dbe0bd2e766e313349b595579dcb7a68d23156
-
Size
242KB
-
Sample
220212-qgyt8aeeak
-
MD5
9110b653c521666b2001f1c62f5cb732
-
SHA1
bde97cc0d863d970955fc8c70f95511737910cad
-
SHA256
7a589215ec59c5fa80e030036f40165d0e7c62882f8c17a1ecf4324735689d64
-
SHA512
2aff0151bd799fffa93b9ff1c8a4752a370c7d25d016bc8f7ef27d248bb168717e7bc95a4589e2dc59aacb6790ede4d704ffd623eee8a5b6874e4813409ad8f8
Static task
static1
Behavioral task
behavioral1
Sample
ea04b52d08b0882cc0f24dd393dbe0bd2e766e313349b595579dcb7a68d23156.exe
Resource
win7-en-20211208
Malware Config
Extracted
redline
ruzkiKAKOYTO
185.215.113.29:20819
-
auth_value
44e87155dd7a4d1957a956ed040ff3fd
Targets
-
-
Target
ea04b52d08b0882cc0f24dd393dbe0bd2e766e313349b595579dcb7a68d23156
-
Size
375KB
-
MD5
c1f4e233528946b0c5b704507b7d48c2
-
SHA1
37850a43e21bbcd13445a27fa8c58e2c117bd486
-
SHA256
ea04b52d08b0882cc0f24dd393dbe0bd2e766e313349b595579dcb7a68d23156
-
SHA512
b16b0b3690543592003d15efa15ed3651fe659689ac27e929d6218b595f497a576d46eb2c34f179cb578e57b781f162dab70022d2235172859dea08853812fef
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-