General
-
Target
355ac2b15a8a3f93d82ee69d246a218ef14b41213c81093ab18f8bc226c4372b
-
Size
551KB
-
Sample
230302-tpn7jadc5s
-
MD5
1af5abfb8ec6b0aa1f8d802ea2d841dc
-
SHA1
ffb3a376feea0d0f1390c5b22e27737e727465e6
-
SHA256
355ac2b15a8a3f93d82ee69d246a218ef14b41213c81093ab18f8bc226c4372b
-
SHA512
4a1f7aed5bcf2f84820808594d1c4ae55b22117bf75f2ed00824a0dfcd98e64be4620f5694e16289c48b1659c8816bfec38522feec65822bb2d96bac8dc2e2b4
-
SSDEEP
12288:FMrBy90A17SpaF/l2zne1sOZcPNyvosvo8Dxc/fx4+puhD5jS:AydNSpaz2zZAANSA8W/6+ku
Static task
static1
Behavioral task
behavioral1
Sample
355ac2b15a8a3f93d82ee69d246a218ef14b41213c81093ab18f8bc226c4372b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
355ac2b15a8a3f93d82ee69d246a218ef14b41213c81093ab18f8bc226c4372b
-
Size
551KB
-
MD5
1af5abfb8ec6b0aa1f8d802ea2d841dc
-
SHA1
ffb3a376feea0d0f1390c5b22e27737e727465e6
-
SHA256
355ac2b15a8a3f93d82ee69d246a218ef14b41213c81093ab18f8bc226c4372b
-
SHA512
4a1f7aed5bcf2f84820808594d1c4ae55b22117bf75f2ed00824a0dfcd98e64be4620f5694e16289c48b1659c8816bfec38522feec65822bb2d96bac8dc2e2b4
-
SSDEEP
12288:FMrBy90A17SpaF/l2zne1sOZcPNyvosvo8Dxc/fx4+puhD5jS:AydNSpaz2zZAANSA8W/6+ku
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-