General
-
Target
13e74e37b39e59bbb53a178000e1d58885939b41ccff9bc11316d2909a742bfa
-
Size
319KB
-
Sample
220531-lv46yaahb5
-
MD5
9baef790f19a8d8d4ad0f6d46d2cdfbd
-
SHA1
eb8062b97f03374f48dd284ed2bc4e8a58d5b6fb
-
SHA256
13e74e37b39e59bbb53a178000e1d58885939b41ccff9bc11316d2909a742bfa
-
SHA512
5d3e8714c270c15628338184b8e8a25d6e2c8631f73e334fa1a14360ece4ddfc2d660337cedde55d1e09b4c9be403b7a7fabd3c885c5c68700f6831ea0bd2488
Static task
static1
Behavioral task
behavioral1
Sample
13e74e37b39e59bbb53a178000e1d58885939b41ccff9bc11316d2909a742bfa.exe
Resource
win10-20220414-en
Malware Config
Extracted
redline
RuzkiUNIKALNO
193.233.48.58:38989
-
auth_value
c504b04cfbdd4bf85ce6195bcb37fba6
Targets
-
-
Target
13e74e37b39e59bbb53a178000e1d58885939b41ccff9bc11316d2909a742bfa
-
Size
319KB
-
MD5
9baef790f19a8d8d4ad0f6d46d2cdfbd
-
SHA1
eb8062b97f03374f48dd284ed2bc4e8a58d5b6fb
-
SHA256
13e74e37b39e59bbb53a178000e1d58885939b41ccff9bc11316d2909a742bfa
-
SHA512
5d3e8714c270c15628338184b8e8a25d6e2c8631f73e334fa1a14360ece4ddfc2d660337cedde55d1e09b4c9be403b7a7fabd3c885c5c68700f6831ea0bd2488
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-