General
-
Target
1efcd028a319c255dda8442ec3ed615d2477545bdf75bcd715b72ebb332c4b7a
-
Size
415KB
-
Sample
220521-wfy2gsdgcj
-
MD5
c977f09739bc0730a3f72ec9c536510c
-
SHA1
195f86d97b2c8984158caa3270e12d6ce35a8249
-
SHA256
1efcd028a319c255dda8442ec3ed615d2477545bdf75bcd715b72ebb332c4b7a
-
SHA512
d46bd09c54633de8bbc64170eadfdd08df96d00cc6b979eaaae55ef37d3ff9cfe436e9465eb40a7dd1364f8ea0af72659343fff1a33020d1b42212c54867f42a
Static task
static1
Behavioral task
behavioral1
Sample
1efcd028a319c255dda8442ec3ed615d2477545bdf75bcd715b72ebb332c4b7a.exe
Resource
win10-20220414-en
Malware Config
Extracted
redline
RuzkiUNIKALNO
193.233.48.58:38989
-
auth_value
c504b04cfbdd4bf85ce6195bcb37fba6
Targets
-
-
Target
1efcd028a319c255dda8442ec3ed615d2477545bdf75bcd715b72ebb332c4b7a
-
Size
415KB
-
MD5
c977f09739bc0730a3f72ec9c536510c
-
SHA1
195f86d97b2c8984158caa3270e12d6ce35a8249
-
SHA256
1efcd028a319c255dda8442ec3ed615d2477545bdf75bcd715b72ebb332c4b7a
-
SHA512
d46bd09c54633de8bbc64170eadfdd08df96d00cc6b979eaaae55ef37d3ff9cfe436e9465eb40a7dd1364f8ea0af72659343fff1a33020d1b42212c54867f42a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-