General
-
Target
a8991465e1839b8460bf69528a75fc629b51e5079f020a36768ab7f27e393575
-
Size
477KB
-
Sample
230213-y3d1yafh68
-
MD5
e9e0ec87c791572c882587581fe067da
-
SHA1
e46a127d27e4cca7453f46ca29485c2bbb49d38b
-
SHA256
a8991465e1839b8460bf69528a75fc629b51e5079f020a36768ab7f27e393575
-
SHA512
58eff2327e43d3fb732403239e8a336ed6eea8f495ecb519448751b27a6139e56f92317085070f58e519f9fbfd9e29318ec2ee975eacd25859f9315589adf4f4
-
SSDEEP
6144:KEy+bnr+Fp0yN90QExFGkja1SsuNIYVUSqk+6ruSouaHph9IqYAzNxb0K48iVBhN:MMr5y90da1SsuNAdNSoThGra4RRys
Static task
static1
Behavioral task
behavioral1
Sample
a8991465e1839b8460bf69528a75fc629b51e5079f020a36768ab7f27e393575.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Targets
-
-
Target
a8991465e1839b8460bf69528a75fc629b51e5079f020a36768ab7f27e393575
-
Size
477KB
-
MD5
e9e0ec87c791572c882587581fe067da
-
SHA1
e46a127d27e4cca7453f46ca29485c2bbb49d38b
-
SHA256
a8991465e1839b8460bf69528a75fc629b51e5079f020a36768ab7f27e393575
-
SHA512
58eff2327e43d3fb732403239e8a336ed6eea8f495ecb519448751b27a6139e56f92317085070f58e519f9fbfd9e29318ec2ee975eacd25859f9315589adf4f4
-
SSDEEP
6144:KEy+bnr+Fp0yN90QExFGkja1SsuNIYVUSqk+6ruSouaHph9IqYAzNxb0K48iVBhN:MMr5y90da1SsuNAdNSoThGra4RRys
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-