General
-
Target
4d9a322ae9761ae4e43245fdf2da2d28d22cc9c8512dc2212f293d1d5000922a.zip
-
Size
51KB
-
Sample
230328-ls6xraca3x
-
MD5
42415dead762e4f1fc477795539d25a9
-
SHA1
2022523988df9dfd16ad42cccf6a5f19341c7f27
-
SHA256
a79cb9b5286a74bab12701be23253e45840ead1557a704e0d7f028ad542f6f29
-
SHA512
edfa5cced6bcb5a14fa1ccb62dcc140799dee4a4894ec83e9e32a4cd131abe8d6dcb9c5bf91d0fa530958aa1a6c198c8b2b2b84abb07ea88b388f22e0b10f62a
-
SSDEEP
1536:bfZlP+MHWztHF9HVO0tvYDG9aiIJSghnuBS:/+MHQFHvtKLvhuBS
Behavioral task
behavioral1
Sample
4d9a322ae9761ae4e43245fdf2da2d28d22cc9c8512dc2212f293d1d5000922a.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
4d9a322ae9761ae4e43245fdf2da2d28d22cc9c8512dc2212f293d1d5000922a
-
Size
175KB
-
MD5
7bd3bdf92297e531c88f3a80082d5480
-
SHA1
991c1945ff6e815f606275c12251ef8918bb6d55
-
SHA256
4d9a322ae9761ae4e43245fdf2da2d28d22cc9c8512dc2212f293d1d5000922a
-
SHA512
9cc34a328ec019c130140ea4783c77945f91d95786c86cfbc5cd6af0af2b30fccf9c9d215b7f2d5a6bc116b495090953885a6c2a7c738aa4e95fa6a0e7e7e67d
-
SSDEEP
3072:4xqZWZRanU2n0/Z62eJ5evJ9ih+PxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOm:mqZg/Z6XJIih
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-