General
-
Target
tmp
-
Size
137KB
-
Sample
221201-y5a23agf37
-
MD5
f9fd1c41152be65372a95aa482c0ee9d
-
SHA1
0b3290edd05e7bd6d1d4ec30226533fb54d0c62d
-
SHA256
47ef63815e62c44ab52f5034c2dac4ee6dbb043c5745c88197e666fa1cee9084
-
SHA512
6fd2844ff80ac65554497f6315502aa522544782f1f8f0c5c718ce3b7a90758f2a1a250eba7a65ea2aafa0b604381822ce1fe6d4a879193a601b178bd32b4030
-
SSDEEP
3072:fYO/ZMTFxF+wI4T1p+ac9JEy+noWFVyRP5hNSS0T:fYMZMBxFzIOkaC+oHp5h
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
myfile
18.220.118.211:37733
-
auth_value
90b715db3f4c0e3cf3d43bcda516644f
Targets
-
-
Target
tmp
-
Size
137KB
-
MD5
f9fd1c41152be65372a95aa482c0ee9d
-
SHA1
0b3290edd05e7bd6d1d4ec30226533fb54d0c62d
-
SHA256
47ef63815e62c44ab52f5034c2dac4ee6dbb043c5745c88197e666fa1cee9084
-
SHA512
6fd2844ff80ac65554497f6315502aa522544782f1f8f0c5c718ce3b7a90758f2a1a250eba7a65ea2aafa0b604381822ce1fe6d4a879193a601b178bd32b4030
-
SSDEEP
3072:fYO/ZMTFxF+wI4T1p+ac9JEy+noWFVyRP5hNSS0T:fYMZMBxFzIOkaC+oHp5h
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-