General
-
Target
271b979057da170866b007e766e5ed91bc7a1cb095d90963c5d20498e3b50cae
-
Size
1.1MB
-
Sample
230302-ehlqhaba5z
-
MD5
2a73b11671097fb6e2d774f8fd2e62bf
-
SHA1
6659cecb5b7434bb1dad60ef8cc1012e0e05c2b5
-
SHA256
271b979057da170866b007e766e5ed91bc7a1cb095d90963c5d20498e3b50cae
-
SHA512
1dee218b88ac0a4facf52a16f5092df3dd082a4f941502aceff28da55575b160e93625dd95697ff7a846c6897d83b247aeae97879f82e714512b8f497f24038c
-
SSDEEP
24576:RykHeoNTFOuo5p90xxoJCRcLapWdgo5bp/c7R1TQ06:EUeo1F7o5pOLMCXEfbcfTQ
Static task
static1
Behavioral task
behavioral1
Sample
271b979057da170866b007e766e5ed91bc7a1cb095d90963c5d20498e3b50cae.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
durov
193.56.146.11:4162
-
auth_value
337984645d237df105d30aab7013119f
Targets
-
-
Target
271b979057da170866b007e766e5ed91bc7a1cb095d90963c5d20498e3b50cae
-
Size
1.1MB
-
MD5
2a73b11671097fb6e2d774f8fd2e62bf
-
SHA1
6659cecb5b7434bb1dad60ef8cc1012e0e05c2b5
-
SHA256
271b979057da170866b007e766e5ed91bc7a1cb095d90963c5d20498e3b50cae
-
SHA512
1dee218b88ac0a4facf52a16f5092df3dd082a4f941502aceff28da55575b160e93625dd95697ff7a846c6897d83b247aeae97879f82e714512b8f497f24038c
-
SSDEEP
24576:RykHeoNTFOuo5p90xxoJCRcLapWdgo5bp/c7R1TQ06:EUeo1F7o5pOLMCXEfbcfTQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-