General
-
Target
eca7fd26b8b83be8f5eb9ed5cccea73289b1211342e443aa7b627deb2d34e302
-
Size
1.1MB
-
Sample
230301-wc6l6agh5s
-
MD5
e401ba6d3387f82b5ac42520aa376e87
-
SHA1
e31686ad682af0ed8797927caf9df2481361a3cf
-
SHA256
eca7fd26b8b83be8f5eb9ed5cccea73289b1211342e443aa7b627deb2d34e302
-
SHA512
15c1e665065b248401c110c36f1dfd833f2c26d8fa000f8013b1539db81ae642890cf9a325feb609df64818f5cfa02d9e6ce9badade193d7796ea2049467a0c5
-
SSDEEP
24576:6y1rv2nvWWqnOcyG/+sUP782D2jdz8ioC4:BQnvWrn4sUPI2Didz8l
Static task
static1
Behavioral task
behavioral1
Sample
eca7fd26b8b83be8f5eb9ed5cccea73289b1211342e443aa7b627deb2d34e302.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
durov
193.56.146.11:4162
-
auth_value
337984645d237df105d30aab7013119f
Targets
-
-
Target
eca7fd26b8b83be8f5eb9ed5cccea73289b1211342e443aa7b627deb2d34e302
-
Size
1.1MB
-
MD5
e401ba6d3387f82b5ac42520aa376e87
-
SHA1
e31686ad682af0ed8797927caf9df2481361a3cf
-
SHA256
eca7fd26b8b83be8f5eb9ed5cccea73289b1211342e443aa7b627deb2d34e302
-
SHA512
15c1e665065b248401c110c36f1dfd833f2c26d8fa000f8013b1539db81ae642890cf9a325feb609df64818f5cfa02d9e6ce9badade193d7796ea2049467a0c5
-
SSDEEP
24576:6y1rv2nvWWqnOcyG/+sUP782D2jdz8ioC4:BQnvWrn4sUPI2Didz8l
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-