General
-
Target
PicturesDrawings.tar
-
Size
5.6MB
-
Sample
221125-q6dwcafc9s
-
MD5
01c1660c5c993d05086ff4399d7a039a
-
SHA1
0b98de90252028ffc429cdc84c0c8bb190b5587a
-
SHA256
672b7528894303d62f523e6136da0bd59c9bc9b0f9790a90dff0919c002f6ec5
-
SHA512
59f107636679b9102db9ce20758e957fa3ea16afe9d775f2b824694c0e5422ec55e8bf13283ca27bc0dd1c2c1ca542d5400ef8d1a14cc18737d9777ddb4b05a6
-
SSDEEP
98304:0fgtQICDtPfeE/jowqK5LN1KQ0oTh2M9QrABlolllOr3pDqoGZvVYm:0yQICteErownP0oTcMsABqlglMZl
Behavioral task
behavioral1
Sample
853224ac39d813dbb9e806ab0c12f04a.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
Favour
149.56.226.65:5985
Targets
-
-
Target
853224ac39d813dbb9e806ab0c12f04a.exe
-
Size
5.6MB
-
MD5
c912359df1edfea3b02e6f05925ecd1c
-
SHA1
b08421bb53fa7f1bc59410e73b931dc5122933c7
-
SHA256
5a07bc69ad4a2437e2a2ee9913a60fc6f147a895ea5d82bc2c1e3103a0b54454
-
SHA512
ccb583e7e8376d12a8b90437c128168eb44923a8ad65bd8444430028b076a73cf2c8e0becab5b24141cfa68d052f31f1919e6598c614f85e3bd5f6102fa663ab
-
SSDEEP
98304:/fgtQICDtPfeE/jowqK5LN1KQ0oTh2M9QrABlolllOr3pDqoGZvVYmj:/yQICteErownP0oTcMsABqlglMZlj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-