General
-
Target
04e935bc132a84935c2229379b799caf8402d0c60a89c7ce715d4cdd405aa7c1
-
Size
415KB
-
Sample
220521-wahsbaadd8
-
MD5
de91a17714e2c8506b9dc25910045048
-
SHA1
86f9797a7483b12d74f0de5d5183eaf3741caca2
-
SHA256
04e935bc132a84935c2229379b799caf8402d0c60a89c7ce715d4cdd405aa7c1
-
SHA512
513c73907264ad7be65eab6c2678d0964b90d86d94829364f386676c90d15c5cd2a435a35abb6bfb6243a14e1bab7bba08e3e8499645846148f626da8ddff7a5
Static task
static1
Behavioral task
behavioral1
Sample
04e935bc132a84935c2229379b799caf8402d0c60a89c7ce715d4cdd405aa7c1.exe
Resource
win10-20220414-en
Malware Config
Extracted
redline
RuzkiUNIKALNO
193.233.48.58:38989
-
auth_value
c504b04cfbdd4bf85ce6195bcb37fba6
Targets
-
-
Target
04e935bc132a84935c2229379b799caf8402d0c60a89c7ce715d4cdd405aa7c1
-
Size
415KB
-
MD5
de91a17714e2c8506b9dc25910045048
-
SHA1
86f9797a7483b12d74f0de5d5183eaf3741caca2
-
SHA256
04e935bc132a84935c2229379b799caf8402d0c60a89c7ce715d4cdd405aa7c1
-
SHA512
513c73907264ad7be65eab6c2678d0964b90d86d94829364f386676c90d15c5cd2a435a35abb6bfb6243a14e1bab7bba08e3e8499645846148f626da8ddff7a5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-