General
-
Target
2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72
-
Size
299KB
-
Sample
230301-r74zlagb8v
-
MD5
210f8e0f8b5fae8e56a89d2a44b7c409
-
SHA1
8a66c6add010ca714bfa919e562158178ff721e6
-
SHA256
2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72
-
SHA512
ccce29585877a3ccafd60b3cc200367e1658bf18eba03e64539f5e09f08427d1d12a0b7617e927c07f8b5125c707dc6eb73aceab0e884d403e579eff1d068617
-
SSDEEP
6144:VcTP4Vys9AN73qXZdoxGhhxSh+vwgdFUA1smM07g2:Vcz41AN73qQkbxSUvZuH+
Static task
static1
Behavioral task
behavioral1
Sample
2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72
-
Size
299KB
-
MD5
210f8e0f8b5fae8e56a89d2a44b7c409
-
SHA1
8a66c6add010ca714bfa919e562158178ff721e6
-
SHA256
2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72
-
SHA512
ccce29585877a3ccafd60b3cc200367e1658bf18eba03e64539f5e09f08427d1d12a0b7617e927c07f8b5125c707dc6eb73aceab0e884d403e579eff1d068617
-
SSDEEP
6144:VcTP4Vys9AN73qXZdoxGhhxSh+vwgdFUA1smM07g2:Vcz41AN73qQkbxSUvZuH+
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-