General
-
Target
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746
-
Size
273KB
-
Sample
220811-ynwbnsbgdj
-
MD5
5e20585f0209f0b82c59ab775e436da1
-
SHA1
79a1e0d45ec5d60d8aa8f693945feec273dcd912
-
SHA256
1d95d002bdc988dabb0f2ef25c557418a179859f027a0e91139af1ec798685ad
-
SHA512
6721023953945e9195aefa8ecdfffa05a1075b90778d541c05c9e5fb507b31e2dcc03f3b7d9605435c108689152bb11e78bef656554ff02275acc1e8b1ab3a20
Static task
static1
Behavioral task
behavioral1
Sample
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746.exe
Resource
win7-20220718-en
Malware Config
Extracted
redline
ruzki
193.106.191.165:39482
-
auth_value
71a0558c0eea274a5bd617ea85786884
Targets
-
-
Target
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746
-
Size
355KB
-
MD5
5ff0b585d057489c53eef281c8f32118
-
SHA1
2e15a65e523c1245952f44667b0182bbabf80fe0
-
SHA256
8557f1deff5965261f5ac55fd14654e096a3a677be984f1825c1a2e793848746
-
SHA512
b7c41887928345b9292fd71f3c6aa4b1a66267a487a1e7f7d13ed708bde37c6d82d46de044908ee77b273aaea8355db99b532c551f0e607271c0cad98b616f21
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-