General
-
Target
e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc
-
Size
811KB
-
Sample
230215-t7mrescf2w
-
MD5
7d8ec724d2b1576c14c37ac97375a9f9
-
SHA1
c5ffe546319bccf15f7cbe6d2b59a71fa2669630
-
SHA256
e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc
-
SHA512
3eb48f166e9ea7f9c95486db813b8a81814c2758b37aeff0c49ed5809156fd2f3cfb13d0c00f100251247b306ee844ff285f6f8a41559602fecef5cc369a058a
-
SSDEEP
24576:nyNhSeKldd7iQxS4jr3C2eQWdJka71p72:yN16dwJB9waJp
Static task
static1
Behavioral task
behavioral1
Sample
e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc
-
Size
811KB
-
MD5
7d8ec724d2b1576c14c37ac97375a9f9
-
SHA1
c5ffe546319bccf15f7cbe6d2b59a71fa2669630
-
SHA256
e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc
-
SHA512
3eb48f166e9ea7f9c95486db813b8a81814c2758b37aeff0c49ed5809156fd2f3cfb13d0c00f100251247b306ee844ff285f6f8a41559602fecef5cc369a058a
-
SSDEEP
24576:nyNhSeKldd7iQxS4jr3C2eQWdJka71p72:yN16dwJB9waJp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-