General
-
Target
7721dbffb3262577e536538bf295b2580ca7780fb87de16238de44cecb1514ea
-
Size
1.4MB
-
Sample
230228-3gsz7adg26
-
MD5
e69388f4d35b4056767be25bfa5350aa
-
SHA1
45bfdfb346137536b98ef29d0b79c2814a5434ab
-
SHA256
7721dbffb3262577e536538bf295b2580ca7780fb87de16238de44cecb1514ea
-
SHA512
47fea7c6184975568d718fe6b7591a8a6e2e87954a9318fd77ef25051ee42829f35303471daf1b864d661a33e7a7c157808daf7a7683363bb9434ee2670dd1c8
-
SSDEEP
24576:3y3mloXJqlkmqs5NsxNEatEcKwAsDCfc/5lUpc:C3ZXJfHztLKfsDCfslm
Static task
static1
Behavioral task
behavioral1
Sample
7721dbffb3262577e536538bf295b2580ca7780fb87de16238de44cecb1514ea.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
7721dbffb3262577e536538bf295b2580ca7780fb87de16238de44cecb1514ea
-
Size
1.4MB
-
MD5
e69388f4d35b4056767be25bfa5350aa
-
SHA1
45bfdfb346137536b98ef29d0b79c2814a5434ab
-
SHA256
7721dbffb3262577e536538bf295b2580ca7780fb87de16238de44cecb1514ea
-
SHA512
47fea7c6184975568d718fe6b7591a8a6e2e87954a9318fd77ef25051ee42829f35303471daf1b864d661a33e7a7c157808daf7a7683363bb9434ee2670dd1c8
-
SSDEEP
24576:3y3mloXJqlkmqs5NsxNEatEcKwAsDCfc/5lUpc:C3ZXJfHztLKfsDCfslm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-