General
-
Target
1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5
-
Size
203KB
-
Sample
221018-2lcy4aeefn
-
MD5
2590b1017ea0cf9d56165badf7d6fc60
-
SHA1
271031955c8c734e14f8f7df8c386123ab56f731
-
SHA256
1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5
-
SHA512
fcf87a9beeefd987e107046ac6cb01f28eba74c6426cb48678e5e2ebb209da23677f97ca87d2abbf46034b62e166eec6418f2e1209ee373f32ce16ab3c27b9b4
-
SSDEEP
3072:bXOrdKLhzhiEpPXs5u7UGKEV5Bc13vb+LwZ9EE0KWFyUmKUuS:zadKLh9dFUaVkN+Uz0jyuS
Static task
static1
Behavioral task
behavioral1
Sample
1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
45.15.156.37:110
-
auth_value
5b663effac3b92fe687f0181631eeff2
Targets
-
-
Target
1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5
-
Size
203KB
-
MD5
2590b1017ea0cf9d56165badf7d6fc60
-
SHA1
271031955c8c734e14f8f7df8c386123ab56f731
-
SHA256
1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5
-
SHA512
fcf87a9beeefd987e107046ac6cb01f28eba74c6426cb48678e5e2ebb209da23677f97ca87d2abbf46034b62e166eec6418f2e1209ee373f32ce16ab3c27b9b4
-
SSDEEP
3072:bXOrdKLhzhiEpPXs5u7UGKEV5Bc13vb+LwZ9EE0KWFyUmKUuS:zadKLh9dFUaVkN+Uz0jyuS
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-