General
-
Target
7b0902efeeb48cc377563c4a147a701d5c53840636b52d010cc1d9643eac7f0e
-
Size
329KB
-
Sample
220927-xcdf2sebf9
-
MD5
71094c78bc75f1ad1df80aca84171853
-
SHA1
10aa220e30cd032cd473472363ecc2b3c811239f
-
SHA256
7b0902efeeb48cc377563c4a147a701d5c53840636b52d010cc1d9643eac7f0e
-
SHA512
8c59e3ff0ee41af8a1d6ceb19fbed0bcd3079b1a4b45d6c9e9db9a3ffb0a22f63fa27c60c212f9c2f6f64d6b6ce9dd80aca34cab27d474fe3643c91321561fa0
-
SSDEEP
6144:pyIKU06MvnMQfXb0/bfLB7WnigabwVfse:pyIC6MvnMQfg/bfVaiBe
Static task
static1
Behavioral task
behavioral1
Sample
7b0902efeeb48cc377563c4a147a701d5c53840636b52d010cc1d9643eac7f0e.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
insmix
jamesmillion2.xyz:9420
-
auth_value
f388a05524f756108c9e4b0f4c4bafb6
Targets
-
-
Target
7b0902efeeb48cc377563c4a147a701d5c53840636b52d010cc1d9643eac7f0e
-
Size
329KB
-
MD5
71094c78bc75f1ad1df80aca84171853
-
SHA1
10aa220e30cd032cd473472363ecc2b3c811239f
-
SHA256
7b0902efeeb48cc377563c4a147a701d5c53840636b52d010cc1d9643eac7f0e
-
SHA512
8c59e3ff0ee41af8a1d6ceb19fbed0bcd3079b1a4b45d6c9e9db9a3ffb0a22f63fa27c60c212f9c2f6f64d6b6ce9dd80aca34cab27d474fe3643c91321561fa0
-
SSDEEP
6144:pyIKU06MvnMQfXb0/bfLB7WnigabwVfse:pyIC6MvnMQfg/bfVaiBe
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-