General
-
Target
e2c6a9a1f7b98ef80a162f0f302a91341c7d8c9e2feeebc6b271e0e7fe247899
-
Size
283KB
-
Sample
230112-w6ds8shb52
-
MD5
1b648f9e1ab2e2f30ba3023fdd6f3bb1
-
SHA1
ee04ae3300f8f74b84afe47433b4a42641348196
-
SHA256
43fa1f35e29e9723f3959a67f4843c56d6d000798318a30022c2831be76912bd
-
SHA512
b4f492c5678489bb974ea53d70a0f1762965c53911ebbc30921ab4bf7e1c2d5fbcf002419c382cae336d79aacbeffbdc917d47f1fc4eab6c25947817c996f361
-
SSDEEP
6144:l2mLH8JHl0nZi2yTR65+eVqyvAbYgZ7L9VXjHeh0mWOaIb:l2dFdTR65HVqyvAn7L9VzohEIb
Static task
static1
Behavioral task
behavioral1
Sample
e2c6a9a1f7b98ef80a162f0f302a91341c7d8c9e2feeebc6b271e0e7fe247899.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
@2023@New
91.215.85.155:32796
-
auth_value
0be5b9b84cd5b707e91a48e341e3f7d7
Targets
-
-
Target
e2c6a9a1f7b98ef80a162f0f302a91341c7d8c9e2feeebc6b271e0e7fe247899
-
Size
382KB
-
MD5
37a0780879cad909c9294ef95d86fb81
-
SHA1
b115ae2a592620d5fe1ee17fbe883087b5042cda
-
SHA256
e2c6a9a1f7b98ef80a162f0f302a91341c7d8c9e2feeebc6b271e0e7fe247899
-
SHA512
0aa5e0b38765edee7114ee21af62729ab510e3a7a459994dd9dff73e0ae4c975b58a3871490312204d2b9f54057446e583a2bfebe47e3b440d5b3074687cb362
-
SSDEEP
6144:xjYLhZsC66SWk0nni2yTR65WeVqyvAnYgZ21vvFQRdRJHNGpMskFQH2Yp:xjY1ZQTR65PVqyvAj21vvCRNHURkFo2Y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-