General
-
Target
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53
-
Size
272KB
-
Sample
220812-adj9naeacl
-
MD5
f50ec7324ada861708b19b9a9f392f35
-
SHA1
0e949de927ca969991d40ec463cc0ad2c9a850b5
-
SHA256
0ec86566ded651c99d1f89ea3e9180472defb481b044b215f3623dc177235f30
-
SHA512
d3a748b99163830df5cbab96d2b35467d406d2b419c9a2e1e7e0080804c663a953384c44aa31847af629d281871b2aaeee6a20742ea39594398c7c5c2127a633
Static task
static1
Behavioral task
behavioral1
Sample
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53.exe
Resource
win7-20220715-en
Malware Config
Extracted
redline
ruzki
193.106.191.165:39482
-
auth_value
71a0558c0eea274a5bd617ea85786884
Targets
-
-
Target
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53
-
Size
352KB
-
MD5
fe3ac4d0e8dfb654ddeeb224bddcaacf
-
SHA1
12428273d83136894092244deaa7570c6df6b4a1
-
SHA256
7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53
-
SHA512
d860b3e20f0a5b0ad1e8578b764f59439abfcde0f001649c218d7da779495f521a458a2e8420c3a4630eb6e5045255bece7fc9deb53ac87d9501be4d115e25b9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-