General
-
Target
2282a4fcfa986d6781501636dfd04375c471e05fdfcb65732b088211bd9fff72
-
Size
244KB
-
Sample
221126-agpzbagg54
-
MD5
3165b078ebf046f9bd1b6680d1bdd0b0
-
SHA1
abc7e9b27189ab2063407b56a1c6215123fcc55c
-
SHA256
213ecdada1a4d4ecbe2a3e33602427463245399f9ec38e8a5968ea3dd18c7db6
-
SHA512
44d5beb903aaa82965a9177c8c5acf5cfb41c38a6462e5ac6c5e34634b9533d616fca284644efae13792fc18b2b6e6796749068dc5e72008880d0a79042bee33
-
SSDEEP
6144:45WpAWKyrngbFLTxNv0ixv548E1DgwxA+L91TL:2WpAWKgqdZZ5MCwC+J1X
Static task
static1
Behavioral task
behavioral1
Sample
2282a4fcfa986d6781501636dfd04375c471e05fdfcb65732b088211bd9fff72.exe
Resource
win7-20221111-en
Malware Config
Extracted
redline
NewYear2023
185.106.92.111:2510
-
auth_value
99e9bde3b38509ea98c3316cc27e6106
Targets
-
-
Target
2282a4fcfa986d6781501636dfd04375c471e05fdfcb65732b088211bd9fff72
-
Size
297KB
-
MD5
3091f1775af3bb34121b2caddb4eb353
-
SHA1
1661bf18cf8d266b2c3f1ac50c282dc945e568c8
-
SHA256
2282a4fcfa986d6781501636dfd04375c471e05fdfcb65732b088211bd9fff72
-
SHA512
70f1406e446944459f8488db52e7589d399cfb65460028f89a7ad58d1ddc93d68ffdb942f929c1674df26adaf6478caed1c7fef2798ae490b6bfefa7ddb0b348
-
SSDEEP
3072:y2p5O2LdPuwEPS5rgI6FffwBzqTXtDNUmsSY2zJhB1ruvixX/cKA788sI441Dg3Z:v3l/EBf9TxNvsixv548s1Dgwxg+6f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-