General
-
Target
0b521313f61cb070b50cfa40c898023ff3bb51fb4d428c98c194aa35b2a35940
-
Size
303KB
-
Sample
221220-gpj7csgh25
-
MD5
3dadaedbf32c44af8f02b6a1d68459a9
-
SHA1
a0dca089aba57b3d3ff4f4bf96283f0ebd9efa7b
-
SHA256
58993f8f8a37ff4acfb9d3752f3d89379d55940497dab15f8702d537566720ba
-
SHA512
d25f5b2553033fca881f3be8dcf638a7a8af5500ff0d96c8eca7df86d39f6e3e3c0a9045b6d61164ccc9aa5654af28f79d8639d919c11d51f47aeb65e283b978
-
SSDEEP
6144:DSyEfnLtcJ5NGWfuNJUOiV3tD+uTE0iRmlB+8LQgPXPns:2yqcJ5NH2ridyd+Y0f0
Static task
static1
Behavioral task
behavioral1
Sample
0b521313f61cb070b50cfa40c898023ff3bb51fb4d428c98c194aa35b2a35940.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
nokia
31.41.244.198:4083
-
auth_value
3b38e056d594ae0cf1368e6e1daa3a4e
Targets
-
-
Target
0b521313f61cb070b50cfa40c898023ff3bb51fb4d428c98c194aa35b2a35940
-
Size
404KB
-
MD5
6fa0443422194c2d17c3aef834fdee22
-
SHA1
4e316d7bc461243625e7f5abfbda2cceb5f89006
-
SHA256
0b521313f61cb070b50cfa40c898023ff3bb51fb4d428c98c194aa35b2a35940
-
SHA512
25ec55d6c97884a9e784f4e0522082a1de29d57c278ef4878aa6064a54a1ea66539f52506d904ca9fda11391b7e32acf6cfa4c4530e46570cf27df064250f407
-
SSDEEP
6144:NLjDeAelNcH3pJ5NGwfuNJUMiV3t3+uyVEYvqz+3ng+E49HwchLP3i:NreAmNQ3pJ5Nz2rSdkKBwnVZH9P3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-