General
-
Target
07220efd22672ef2e12ca128a2b05fb624e8552a21090e97de7efc95541be327
-
Size
291KB
-
Sample
221225-xy6dysfb5s
-
MD5
b044009b6d4e941d59193aba6a678c1d
-
SHA1
cf9d3c62b5529bd515d7ecb20b77715ecb336f46
-
SHA256
9516c93803444711be4f380e9a7c058cbdd65e77ed7a805d12a348373e922a96
-
SHA512
322304c1f5195d9bbbd4dae4ca72b9835733cf7a257c6d07d9d2bd19c75689e0bc12b3d3fb97195aaa21696d38fdc0f220a461253984dd89a0475eac5e2609f3
-
SSDEEP
6144:24wazSc0z2uAAFUSSnw4du5YWy5PaKtswZk2J+Cz/NTEfSGd:9s2b23S0YW8yKrpz/w
Static task
static1
Behavioral task
behavioral1
Sample
07220efd22672ef2e12ca128a2b05fb624e8552a21090e97de7efc95541be327.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
@new@2023
77.73.133.62:22344
-
auth_value
8284279aedaed026a9b7cb9c1c0be4e4
Targets
-
-
Target
07220efd22672ef2e12ca128a2b05fb624e8552a21090e97de7efc95541be327
-
Size
373KB
-
MD5
a9d63a425135a5c316cf4f219ecf05ad
-
SHA1
141debc2caa634930244221c7c0322317bd4eb86
-
SHA256
07220efd22672ef2e12ca128a2b05fb624e8552a21090e97de7efc95541be327
-
SHA512
9e4da708ed150d60ee8af46c9cd285f86b8d010a5d51adc1feac6442bfe5ab486d03ac55d31862301fd95a925190240ef74426df388904b86761cbaa45024f87
-
SSDEEP
6144:lLeYRuUrMVz2uAAXUCSnw4DuVYWy5PyKtswZkw78J/7jRGymI:lyUO2bOlSMYW86KrYV7jfm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-