General
-
Target
f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af
-
Size
478KB
-
Sample
230213-1ymtdsga4t
-
MD5
ad73f56789ba7bb139feba1217f9d3b7
-
SHA1
06672cfd3f4d13fc5e9639e7e4f7e2d3cdef8e10
-
SHA256
f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af
-
SHA512
80f1ab2b92c887adedaf060037d54d57d5b5053446c5a1589e573043295a2c1a1bad1c86ad72f8e30421fe47bab84245cf35c713c31def1ac3a4a605b524e3b9
-
SSDEEP
12288:eMrvy90F/0cOMa/B0YY9fHW/e8yU2w80Mbz:NymeMo4KSwAbz
Static task
static1
Behavioral task
behavioral1
Sample
f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Targets
-
-
Target
f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af
-
Size
478KB
-
MD5
ad73f56789ba7bb139feba1217f9d3b7
-
SHA1
06672cfd3f4d13fc5e9639e7e4f7e2d3cdef8e10
-
SHA256
f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af
-
SHA512
80f1ab2b92c887adedaf060037d54d57d5b5053446c5a1589e573043295a2c1a1bad1c86ad72f8e30421fe47bab84245cf35c713c31def1ac3a4a605b524e3b9
-
SSDEEP
12288:eMrvy90F/0cOMa/B0YY9fHW/e8yU2w80Mbz:NymeMo4KSwAbz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-