General
-
Target
6d25990d4209c3d4f3bca3dce35c021a00ec8a0ef9b8992e37bc257b5b5e82d4
-
Size
766KB
-
Sample
221206-dz1ejscc7w
-
MD5
3543e0377685faf722537a0f29a4dd92
-
SHA1
61ee1cbffe6260da76420e115ea77276f0b28742
-
SHA256
3ff7840e3719e254a30797537b27a5b47d24f61130933c05098966e540d68824
-
SHA512
047251ad42e43c00092689b1ac0cee43d544940014f19965eb271c1df1e439556ba940803cac9b11a9c22c852d1aa1ca7a7922df32f9fb00cb8d38ed561e8899
-
SSDEEP
12288:fKyqK4IBm3Jjs60xcvOBHx7+CGIDBUyQKV+hoTuG4bFAc6PCS3Cyi6znT1O4W4ov:CrK4IIaLxcGNthxB+4Ub6PCSyyiqnfWr
Static task
static1
Behavioral task
behavioral1
Sample
6d25990d4209c3d4f3bca3dce35c021a00ec8a0ef9b8992e37bc257b5b5e82d4.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
R101
94.130.179.90:21188
-
auth_value
e838b35467aa845d380b9da0f7ba933c
Targets
-
-
Target
6d25990d4209c3d4f3bca3dce35c021a00ec8a0ef9b8992e37bc257b5b5e82d4
-
Size
1.0MB
-
MD5
460c445a6d025393d093727d11a01c9f
-
SHA1
6977ad07a0301469190eb71b3317bdfd1b049153
-
SHA256
6d25990d4209c3d4f3bca3dce35c021a00ec8a0ef9b8992e37bc257b5b5e82d4
-
SHA512
99b8fafd7ca57fdab65776678814f2323cb9653ab83c8724be781b9f6711d57a9d3e94027cf0bd1983b85d122b3d2463bdbfe7fd5fd25b15c712f40225bd8bce
-
SSDEEP
24576:e1EAEPR9yVWEnilKLwFK+gYn8PCiyywqn3WsouPm:e1FMnyVW8gFHgGC/kqn3Wso/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-