General
-
Target
338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6
-
Size
471KB
-
Sample
230214-j84ffsbh89
-
MD5
06180a6296613b9eb79d2dd696706462
-
SHA1
62851779092c4975652555b8cc77e32ca1528fbb
-
SHA256
338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6
-
SHA512
e370d45a52243ad9cff59f162bfdfe7a6c1ff164d4c1418a003e65dae1878ac27fdb19aee05e89d8b5ec21a494b78da398877be644763bd1d428a1133cc25fa5
-
SSDEEP
12288:7Mrty90DES0TpoXRVVFJT6lD9AxHITzHDPIWn:KytS0ToRrT6lRwoTjx
Static task
static1
Behavioral task
behavioral1
Sample
338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6
-
Size
471KB
-
MD5
06180a6296613b9eb79d2dd696706462
-
SHA1
62851779092c4975652555b8cc77e32ca1528fbb
-
SHA256
338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6
-
SHA512
e370d45a52243ad9cff59f162bfdfe7a6c1ff164d4c1418a003e65dae1878ac27fdb19aee05e89d8b5ec21a494b78da398877be644763bd1d428a1133cc25fa5
-
SSDEEP
12288:7Mrty90DES0TpoXRVVFJT6lD9AxHITzHDPIWn:KytS0ToRrT6lRwoTjx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-