General
-
Target
a90e4377e40ca1d3a53ae22fecdd77dfe7a809c5a395be17e5f49cb137975aa5
-
Size
293KB
-
Sample
221224-saqldadc8y
-
MD5
6ca155de0d243b859e0f08c0a1bcb09f
-
SHA1
bbec0ea3c5419d2aa3649abb6157de34bf6f709e
-
SHA256
ac754b9ecbbf5a9a96c4d289a58cd479216a4258863df0eb03403a61caa408f0
-
SHA512
25643d3972c3f0275e08e174abbebea2a39366378872b4e148c4ce51f142c78aab043dbc05141d5cf54d242899a5a46dc8fc17bd9d3f5ad8a014e8d2a4f6c169
-
SSDEEP
6144:LohuMqaCS9EUs/oDphHLqJ+4RSWkQYM27ZV8pnjGXYrv:L+5TbDfGApWkQYM29V8pL7
Static task
static1
Behavioral task
behavioral1
Sample
a90e4377e40ca1d3a53ae22fecdd77dfe7a809c5a395be17e5f49cb137975aa5.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
@new@2023
77.73.133.62:22344
-
auth_value
8284279aedaed026a9b7cb9c1c0be4e4
Targets
-
-
Target
a90e4377e40ca1d3a53ae22fecdd77dfe7a809c5a395be17e5f49cb137975aa5
-
Size
378KB
-
MD5
c2a3586bcc256ef158810548a7ecc1b4
-
SHA1
cb8d0392a1e66ac8916143f6f3e1de82b92be433
-
SHA256
a90e4377e40ca1d3a53ae22fecdd77dfe7a809c5a395be17e5f49cb137975aa5
-
SHA512
76b80fc4689fab06300a8af46f5fba6d817114cf8abd4b2664a5115f30da5a7622156cb58cb3d97f3020c9852908834ea3fa30308cf62bddf618880459a4c433
-
SSDEEP
6144:fL8FkAmC89QUs/8DphHLqv+4RqWkQYM2RCaMT10T:fQFkpfRDfG2DWkQYM2RlAm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-