General
-
Target
215b795a0af9af8a069630950ad4eeea6f7d823b120d2a2ad8120fc70cca714f
-
Size
552KB
-
Sample
230210-v6vw3sce9w
-
MD5
81ed97d550b3534e6033c50f4d17dafb
-
SHA1
a58e8574225860d7c2e047d4cd749b322b8865b8
-
SHA256
215b795a0af9af8a069630950ad4eeea6f7d823b120d2a2ad8120fc70cca714f
-
SHA512
c735cd2f52b1553e9b8ad4a345e0c8513cee10a3f3c3fa51fce982cb61d3c09f39812704f94ebad4b02e5ec17e652f29e62ae24eee096d50263d5a62aac07f59
-
SSDEEP
12288:zMrRy90zDPP9CohmyjKFIu4iU5shrhBikKoskk:Syk1Cohpuiu4LmrHTKik
Static task
static1
Behavioral task
behavioral1
Sample
215b795a0af9af8a069630950ad4eeea6f7d823b120d2a2ad8120fc70cca714f.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Targets
-
-
Target
215b795a0af9af8a069630950ad4eeea6f7d823b120d2a2ad8120fc70cca714f
-
Size
552KB
-
MD5
81ed97d550b3534e6033c50f4d17dafb
-
SHA1
a58e8574225860d7c2e047d4cd749b322b8865b8
-
SHA256
215b795a0af9af8a069630950ad4eeea6f7d823b120d2a2ad8120fc70cca714f
-
SHA512
c735cd2f52b1553e9b8ad4a345e0c8513cee10a3f3c3fa51fce982cb61d3c09f39812704f94ebad4b02e5ec17e652f29e62ae24eee096d50263d5a62aac07f59
-
SSDEEP
12288:zMrRy90zDPP9CohmyjKFIu4iU5shrhBikKoskk:Syk1Cohpuiu4LmrHTKik
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-