General
-
Target
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53
-
Size
272KB
-
Sample
220811-3rgd5sgcg3
-
MD5
efb7d30ee7ea7b5cafc3e06b568330d9
-
SHA1
405d06200a00c20da24910ff769cc8a5fcbc2c65
-
SHA256
07126a5fb676562b38b6039dd19971e4fc2f90acfd8199be583b0cbb6094432b
-
SHA512
401066e3e5a09fd2cdda40770eb4189367cf30084fd4b225dca723532180e5915f315845c353a7a1fc6515406cc87b636358edbc55e644605880aa2341e0fa2c
Static task
static1
Behavioral task
behavioral1
Sample
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53.exe
Resource
win7-20220718-en
Malware Config
Extracted
redline
ruzki
193.106.191.165:39482
-
auth_value
71a0558c0eea274a5bd617ea85786884
Targets
-
-
Target
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53
-
Size
352KB
-
MD5
fe3ac4d0e8dfb654ddeeb224bddcaacf
-
SHA1
12428273d83136894092244deaa7570c6df6b4a1
-
SHA256
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53
-
SHA512
d860b3e20f0a5b0ad1e8578b764f59439abfcde0f001649c218d7da779495f521a458a2e8420c3a4630eb6e5045255bece7fc9deb53ac87d9501be4d115e25b9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-