General
-
Target
2da02c7ff13e76ae9bafb7d7e9b5c5e260ed7845ba505cd62827880c13bcc0df
-
Size
404KB
-
Sample
230316-gffsksbe7v
-
MD5
6fe41becb10a6e23e458ea1023971ca4
-
SHA1
59146915a47d31c1bd6dd6ad7f8b9200315a488f
-
SHA256
2da02c7ff13e76ae9bafb7d7e9b5c5e260ed7845ba505cd62827880c13bcc0df
-
SHA512
1a190f7d562c966e98a2a6e8161fb991478df0fc1a488ff4675b5e8fe1bfa5ba2e7922ae11c5b0e8e3ef0b52424864267b9eb983904b1ea96f119a06af6c3195
-
SSDEEP
6144:HDuJgrL53jUzXjOJ88WNSBKcw85bSCxaTE+2S0Qo:HKJgrV3jyKWNir52k+2S
Static task
static1
Behavioral task
behavioral1
Sample
2da02c7ff13e76ae9bafb7d7e9b5c5e260ed7845ba505cd62827880c13bcc0df.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
2da02c7ff13e76ae9bafb7d7e9b5c5e260ed7845ba505cd62827880c13bcc0df
-
Size
404KB
-
MD5
6fe41becb10a6e23e458ea1023971ca4
-
SHA1
59146915a47d31c1bd6dd6ad7f8b9200315a488f
-
SHA256
2da02c7ff13e76ae9bafb7d7e9b5c5e260ed7845ba505cd62827880c13bcc0df
-
SHA512
1a190f7d562c966e98a2a6e8161fb991478df0fc1a488ff4675b5e8fe1bfa5ba2e7922ae11c5b0e8e3ef0b52424864267b9eb983904b1ea96f119a06af6c3195
-
SSDEEP
6144:HDuJgrL53jUzXjOJ88WNSBKcw85bSCxaTE+2S0Qo:HKJgrV3jyKWNir52k+2S
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-