General
-
Target
03701fd6e2be939b3f3dbeaa0060b97e29aa722b691de990ddcf42832f09f902
-
Size
271KB
-
Sample
230101-nzt8msbf22
-
MD5
70343d41b5f4ccbeb06149ea7b70266e
-
SHA1
f401f3a59c4488279fc20a0a3e6aacf1344c4bc9
-
SHA256
f98c9416dfa997c6148a01730b998cb73922b02ff18bac640de558cb298da252
-
SHA512
edb9944b3e81141790cec6e6cb2d70586ffb2906ec994cd344e08b2eeefb12ef15b15e5d38b7300dfa3f410e6eb576dd3f61a12340e87f3ad1eedcd54640a00b
-
SSDEEP
6144:rb5DnmOVCvKCsCW7Pfxt7nFi5KH1OEfFssZRZmVYmWct6Oa3qGfyK:BznovKClW7ht7nFqgOP4RkQDOVGfyK
Static task
static1
Behavioral task
behavioral1
Sample
03701fd6e2be939b3f3dbeaa0060b97e29aa722b691de990ddcf42832f09f902.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
sport
31.41.244.98:4063
-
auth_value
82cce55eeb56b322651e98032c09d225
Targets
-
-
Target
03701fd6e2be939b3f3dbeaa0060b97e29aa722b691de990ddcf42832f09f902
-
Size
359KB
-
MD5
c6f28ca88b5af014b957b9cd489680c3
-
SHA1
1c7fd3947a01757236e722041335a5a52f267c12
-
SHA256
03701fd6e2be939b3f3dbeaa0060b97e29aa722b691de990ddcf42832f09f902
-
SHA512
a485d474e03fec571d9fedf423f36c38b61d15869baebe9d904d0f50e86114b41992932fe09c508ca10c91cb94abfe7b86dd3bb9fd75ccb43a60c37db54fc55f
-
SSDEEP
6144:AALb9uySW7Pfxt7TFidKH1OEfFss/RZmVYmWGbKZY:AAf9uzW7ht7TFMgOPcRkQY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-