General
-
Target
1964-55-0x0000000000250000-0x000000000026E000-memory.dmp
-
Size
120KB
-
Sample
230324-jwqzlafb5t
-
MD5
5de6d21be99b4300676781c836dedfb7
-
SHA1
b4075d19a6711541f37ecd084e2459d46c9c1aff
-
SHA256
632d4d07cceaf22b425c7c3cb72ddfebafa5875df162fe973c6b3d9d0ed90946
-
SHA512
52b96ab8b6a4143c892061be617677c14414d4f6edc9572252bea5a4431de3247e3d2b4fa727803789cb073a47fd9a13f9641fdbba26cceca88ce5ba46f34723
-
SSDEEP
1536:5qsIOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2ZteulgS6p8l:XTuOYj+zi0ZbYe1g0ujyzd98
Behavioral task
behavioral1
Sample
1964-55-0x0000000000250000-0x000000000026E000-memory.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
Mo2aXYZ
172.174.202.77:2341
Targets
-
-
Target
1964-55-0x0000000000250000-0x000000000026E000-memory.dmp
-
Size
120KB
-
MD5
5de6d21be99b4300676781c836dedfb7
-
SHA1
b4075d19a6711541f37ecd084e2459d46c9c1aff
-
SHA256
632d4d07cceaf22b425c7c3cb72ddfebafa5875df162fe973c6b3d9d0ed90946
-
SHA512
52b96ab8b6a4143c892061be617677c14414d4f6edc9572252bea5a4431de3247e3d2b4fa727803789cb073a47fd9a13f9641fdbba26cceca88ce5ba46f34723
-
SSDEEP
1536:5qsIOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2ZteulgS6p8l:XTuOYj+zi0ZbYe1g0ujyzd98
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-