General
-
Target
30235e862a4d094f3cdb0fc9fdb3baef87d693f3f82042fa421ffa7b5b136076
-
Size
546KB
-
Sample
230302-x8qfgsed62
-
MD5
f9a72163a1a48315500485d1ec95d8cd
-
SHA1
086aa557e65852e389f7f6d2d86bc17d42fe4b24
-
SHA256
30235e862a4d094f3cdb0fc9fdb3baef87d693f3f82042fa421ffa7b5b136076
-
SHA512
4dd66e9f8765bc7eac0648d36609312f0fafb40831743eff8a30968725c25d030438bdffb45dad16d43649386d95443f839e459023e56a8c57c532a6fb68ef30
-
SSDEEP
12288:oMrly90zEQ2aWAl4nxVYWvTKkP7PYRaJuut:NyefWm4xJLzvsut
Static task
static1
Behavioral task
behavioral1
Sample
30235e862a4d094f3cdb0fc9fdb3baef87d693f3f82042fa421ffa7b5b136076.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
30235e862a4d094f3cdb0fc9fdb3baef87d693f3f82042fa421ffa7b5b136076
-
Size
546KB
-
MD5
f9a72163a1a48315500485d1ec95d8cd
-
SHA1
086aa557e65852e389f7f6d2d86bc17d42fe4b24
-
SHA256
30235e862a4d094f3cdb0fc9fdb3baef87d693f3f82042fa421ffa7b5b136076
-
SHA512
4dd66e9f8765bc7eac0648d36609312f0fafb40831743eff8a30968725c25d030438bdffb45dad16d43649386d95443f839e459023e56a8c57c532a6fb68ef30
-
SSDEEP
12288:oMrly90zEQ2aWAl4nxVYWvTKkP7PYRaJuut:NyefWm4xJLzvsut
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-