General
-
Target
0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18
-
Size
301KB
-
Sample
220916-tl3kragbf7
-
MD5
3d3f636b69be16bbc9b2050c0a248852
-
SHA1
63741ebe6b98d66228a7caa92fd216b7541fbd34
-
SHA256
0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18
-
SHA512
ae2498e579e8f7298eb15c0a2446f76583a1b7fa604dbea8c48a7544c612a92547350bd06bfbd126c1ef541030572fb39845ab5a75a08fe7c8f20e02298294d8
-
SSDEEP
6144:x4+XRD5SjsiEvxAU3ZL7vZ0w+zJ3qSnigabwVf:xhXRD5S9EJAcZL7CVJi
Static task
static1
Behavioral task
behavioral1
Sample
0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
noviy
157.90.19.174:23447
-
auth_value
9a329af57ce39a0a4f8e36dbf6cd6106
Targets
-
-
Target
0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18
-
Size
301KB
-
MD5
3d3f636b69be16bbc9b2050c0a248852
-
SHA1
63741ebe6b98d66228a7caa92fd216b7541fbd34
-
SHA256
0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18
-
SHA512
ae2498e579e8f7298eb15c0a2446f76583a1b7fa604dbea8c48a7544c612a92547350bd06bfbd126c1ef541030572fb39845ab5a75a08fe7c8f20e02298294d8
-
SSDEEP
6144:x4+XRD5SjsiEvxAU3ZL7vZ0w+zJ3qSnigabwVf:xhXRD5S9EJAcZL7CVJi
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-