General
-
Target
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2
-
Size
716KB
-
Sample
230212-3blzpagf3s
-
MD5
f62854af58d4aef23d3ec5e63696ffc4
-
SHA1
eafdaa4c408dad0ff44dbcf9cf9b839554796117
-
SHA256
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2
-
SHA512
4e578d91eaa7ac7d771cc28c29f9cc606be40461202731199f1c517d86dd5f1529f0f37b87a0c6e8f3db8b92ba46707f60b8d1652c0bcaa701bc683f886bba42
-
SSDEEP
12288:oMrBy90zfEeZV1UDyUo4wDA9AxqIKlGf88/KdIP8WyK0ilFpTf5jCij8R0r3Jlab:Zy6fVzCaVM6q8f88/KdIpeaRjkSrzuBX
Static task
static1
Behavioral task
behavioral1
Sample
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2
-
Size
716KB
-
MD5
f62854af58d4aef23d3ec5e63696ffc4
-
SHA1
eafdaa4c408dad0ff44dbcf9cf9b839554796117
-
SHA256
71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2
-
SHA512
4e578d91eaa7ac7d771cc28c29f9cc606be40461202731199f1c517d86dd5f1529f0f37b87a0c6e8f3db8b92ba46707f60b8d1652c0bcaa701bc683f886bba42
-
SSDEEP
12288:oMrBy90zfEeZV1UDyUo4wDA9AxqIKlGf88/KdIP8WyK0ilFpTf5jCij8R0r3Jlab:Zy6fVzCaVM6q8f88/KdIpeaRjkSrzuBX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-