General
-
Target
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746
-
Size
273KB
-
Sample
220811-ylw57aeab8
-
MD5
d5d0a3dbba1bf8e84adb21b3d509378f
-
SHA1
749e7513bbedbb98b9ab6a5818b0c6d3aec08de6
-
SHA256
4cbc8b94afd7d899aeb946cf5b228e005da92e34934faad79513321ef84c9709
-
SHA512
09c948fa79d5d3030c44103307d471cd00b27562f0d5036fc3e2fcba01ad23d4e3a0742fa6458848193a08b7e78e1a85bf2011d4f3198aa1b89393cfefcb7e42
Static task
static1
Behavioral task
behavioral1
Sample
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746.exe
Resource
win7-20220715-en
Malware Config
Extracted
redline
ruzki
193.106.191.165:39482
-
auth_value
71a0558c0eea274a5bd617ea85786884
Targets
-
-
Target
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746
-
Size
355KB
-
MD5
5ff0b585d057489c53eef281c8f32118
-
SHA1
2e15a65e523c1245952f44667b0182bbabf80fe0
-
SHA256
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746
-
SHA512
b7c41887928345b9292fd71f3c6aa4b1a66267a487a1e7f7d13ed708bde37c6d82d46de044908ee77b273aaea8355db99b532c551f0e607271c0cad98b616f21
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-