General
-
Target
2d160d7d3ce1a4d14445c6f52d5ca1d34eb70d0b1f21a6dff74733d4f1514d47
-
Size
478KB
-
Sample
230214-zw2dbsgb94
-
MD5
8962dfc3fa32afeaf775c8f937d023e4
-
SHA1
bec15c7adb9fa3b9b1519b924b8bf51a6dcd98f2
-
SHA256
2d160d7d3ce1a4d14445c6f52d5ca1d34eb70d0b1f21a6dff74733d4f1514d47
-
SHA512
c72338af6dff37ffb6fe93ab0f846e81a847859618bfc997819597579223aa15320dffa8d6bfac758413eafe47db25d8444d6a33877cba51b3d85488634a00b3
-
SSDEEP
6144:Kxy+bnr+np0yN90QECPGInsGMuYIBf6/4yjX3cNzQq3YRz0JqABZimdmtg:LMrTy90GDsGMqBfG4yGUq3YREqEZpJ
Static task
static1
Behavioral task
behavioral1
Sample
2d160d7d3ce1a4d14445c6f52d5ca1d34eb70d0b1f21a6dff74733d4f1514d47.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
2d160d7d3ce1a4d14445c6f52d5ca1d34eb70d0b1f21a6dff74733d4f1514d47
-
Size
478KB
-
MD5
8962dfc3fa32afeaf775c8f937d023e4
-
SHA1
bec15c7adb9fa3b9b1519b924b8bf51a6dcd98f2
-
SHA256
2d160d7d3ce1a4d14445c6f52d5ca1d34eb70d0b1f21a6dff74733d4f1514d47
-
SHA512
c72338af6dff37ffb6fe93ab0f846e81a847859618bfc997819597579223aa15320dffa8d6bfac758413eafe47db25d8444d6a33877cba51b3d85488634a00b3
-
SSDEEP
6144:Kxy+bnr+np0yN90QECPGInsGMuYIBf6/4yjX3cNzQq3YRz0JqABZimdmtg:LMrTy90GDsGMqBfG4yGUq3YREqEZpJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-