General
-
Target
3186169465bd21bcff1362b757e31e4a82ee4708688cdf8af09817395a483ee5
-
Size
282KB
-
Sample
230114-vld3tsag83
-
MD5
8e13779be55d650188d40676e1be4423
-
SHA1
fa204748b01a3a472f64dfe83a8b6635a4efd3c0
-
SHA256
c8e23dd4e92ba580281a114b964ab19438515b66979c86f15cdd337a787fde87
-
SHA512
5e72a1dc96543c68a8e8d209455b614a65bcf29b81d43ff2b2aa7991be6f271d92c71a10e50d649cdabee49718835228a9f8d73160ceda9791123ae987a714d8
-
SSDEEP
6144:qFW2oZgrul0tO20vkiL9cxKTJF4laJ20C5wto5OQ/GnHjtj:qs0BtOxvNL9XFWTaooQ/eHjtj
Static task
static1
Behavioral task
behavioral1
Sample
3186169465bd21bcff1362b757e31e4a82ee4708688cdf8af09817395a483ee5.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
@2023@New
91.215.85.155:32796
-
auth_value
0be5b9b84cd5b707e91a48e341e3f7d7
Targets
-
-
Target
3186169465bd21bcff1362b757e31e4a82ee4708688cdf8af09817395a483ee5
-
Size
381KB
-
MD5
ad959f501915b133e131007c51a0f818
-
SHA1
ce444aeaf0f55cb436f8e4ca9fd1a3346f966a3c
-
SHA256
3186169465bd21bcff1362b757e31e4a82ee4708688cdf8af09817395a483ee5
-
SHA512
b8cba1d00430e8bdf276332c7adb59a134c3661e7a3a33c91a85bf070d38a7b295cd9086d6954c7b3df788e5caf85dfb7a233fa5f04f85721bd625de319b7998
-
SSDEEP
6144:s00JDcGYtg20vkiH9cxKzJF4laJ3mG5LJfCMRSKpgpRjFE:s001c9tgxvNH9jFWAmG5Z3RSKSL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-