General
-
Target
2780-191-0x0000000000F80000-0x00000000014A2000-memory.dmp
-
Size
5.1MB
-
Sample
220522-mnjr4ahgb6
-
MD5
c0847141675cc3928f3cf19db23dc86d
-
SHA1
89b3fb2ce75fb201247c69d6972b32ceacbe9357
-
SHA256
9dc968d583f2d026ee46d35769c6f90f3f1eb9095bae7f17796b80db7d792059
-
SHA512
c5925361960cd1e65d6b954d8cd05b408e95d51ef1827c02fc6c560ddc55be7e90b767cd2252cf46e64549de51dbf8871ccb341071c41e9fb96ce579363fc274
Behavioral task
behavioral1
Sample
2780-191-0x0000000000F80000-0x00000000014A2000-memory.exe
Resource
win7-20220414-en
Malware Config
Extracted
redline
1
45.10.43.167:26696
-
auth_value
3a70a3e2f548aaf61e05be9e4cadc7c1
Targets
-
-
Target
2780-191-0x0000000000F80000-0x00000000014A2000-memory.dmp
-
Size
5.1MB
-
MD5
c0847141675cc3928f3cf19db23dc86d
-
SHA1
89b3fb2ce75fb201247c69d6972b32ceacbe9357
-
SHA256
9dc968d583f2d026ee46d35769c6f90f3f1eb9095bae7f17796b80db7d792059
-
SHA512
c5925361960cd1e65d6b954d8cd05b408e95d51ef1827c02fc6c560ddc55be7e90b767cd2252cf46e64549de51dbf8871ccb341071c41e9fb96ce579363fc274
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-