General
-
Target
266cc131844397908aadea08b3fa763ece85d4aa3a56d3f2758e730a6e08bf0d
-
Size
550KB
-
Sample
230302-ppk3nace61
-
MD5
a57065ea21f2eb5beff47ea673a128c1
-
SHA1
e9eda5cf2108b15d9c5e0bf7d65d8f76c1c8400a
-
SHA256
266cc131844397908aadea08b3fa763ece85d4aa3a56d3f2758e730a6e08bf0d
-
SHA512
877f35fd376c6b44baffb46dea03b8c6c4139e373e8a7b10003547345e59ee73a6eeef2ce11e51e374ddd52f64d4ce90c65fd930dcbc436b5fe5f48b59c92bf2
-
SSDEEP
12288:OMr5y90NS78VBqDfA6YEFKB0R90mk0HQK+LMsyNw:PycBVEjHRHk0/+4syi
Static task
static1
Behavioral task
behavioral1
Sample
266cc131844397908aadea08b3fa763ece85d4aa3a56d3f2758e730a6e08bf0d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
266cc131844397908aadea08b3fa763ece85d4aa3a56d3f2758e730a6e08bf0d
-
Size
550KB
-
MD5
a57065ea21f2eb5beff47ea673a128c1
-
SHA1
e9eda5cf2108b15d9c5e0bf7d65d8f76c1c8400a
-
SHA256
266cc131844397908aadea08b3fa763ece85d4aa3a56d3f2758e730a6e08bf0d
-
SHA512
877f35fd376c6b44baffb46dea03b8c6c4139e373e8a7b10003547345e59ee73a6eeef2ce11e51e374ddd52f64d4ce90c65fd930dcbc436b5fe5f48b59c92bf2
-
SSDEEP
12288:OMr5y90NS78VBqDfA6YEFKB0R90mk0HQK+LMsyNw:PycBVEjHRHk0/+4syi
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-