General
-
Target
3e2928737ebcd21eaac620fdc4070015a3abaa351c702fc3551be73c100a4472
-
Size
292KB
-
Sample
230315-b3qcmscg5x
-
MD5
0c299452553e5a5ff5db71234b40e198
-
SHA1
d18ee64c575b6b77b00bea6ca45a9aa6cc3e8b9a
-
SHA256
3e2928737ebcd21eaac620fdc4070015a3abaa351c702fc3551be73c100a4472
-
SHA512
1823a7fd0788b442c9e34a3762a95301d00205b5932f0988e1f146909a9cf55ab0bdfbb169c7dfd89c3dd5cb51c34549025e5e245e615403649d964d1eb5db2d
-
SSDEEP
6144:wxl4n9EC8BNsUzGC+fpwuSumHTJ6Sr6pM+/8uO:wxa9g4Uzx+y1dQ1
Static task
static1
Behavioral task
behavioral1
Sample
3e2928737ebcd21eaac620fdc4070015a3abaa351c702fc3551be73c100a4472.exe
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
3e2928737ebcd21eaac620fdc4070015a3abaa351c702fc3551be73c100a4472
-
Size
292KB
-
MD5
0c299452553e5a5ff5db71234b40e198
-
SHA1
d18ee64c575b6b77b00bea6ca45a9aa6cc3e8b9a
-
SHA256
3e2928737ebcd21eaac620fdc4070015a3abaa351c702fc3551be73c100a4472
-
SHA512
1823a7fd0788b442c9e34a3762a95301d00205b5932f0988e1f146909a9cf55ab0bdfbb169c7dfd89c3dd5cb51c34549025e5e245e615403649d964d1eb5db2d
-
SSDEEP
6144:wxl4n9EC8BNsUzGC+fpwuSumHTJ6Sr6pM+/8uO:wxa9g4Uzx+y1dQ1
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-