General
-
Target
2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7.zip
-
Size
51KB
-
Sample
230328-nz1enaag72
-
MD5
663fa2d366f99cc0962011e46ab45cb7
-
SHA1
a482099d3edcfb9914c092e92c74b54a7a3d0b14
-
SHA256
04c6a3f5a861b50425032f34ddc7f73c893113f681563c3b75b7576f6774bf72
-
SHA512
47df0780cb61253bf4e3f3008eb46bfad8085c28434891d80a883847a2645dd8d2a5246f83e1e24c384da5ad42f2bb250450838cc08280a9a3f4d1b3e0eaf22b
-
SSDEEP
1536:9zqji9WNuVHbtJMvGvdrLg8i9jzrY/GsyWc4+T:9zZ6udbtJMGN3i9PvjhT
Behavioral task
behavioral1
Sample
2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
luza
176.113.115.145:4125
-
auth_value
1261701914d508e02e8b4f25d38bc7f9
Targets
-
-
Target
2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7
-
Size
175KB
-
MD5
438274becd1d693975e568caf19734a9
-
SHA1
0538421a4739a043d045e34f5ae89189d0db4e63
-
SHA256
2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7
-
SHA512
6cd0653f9f9a8efc04afdfd73ab1fece3684a4a6a93a4a74abda685dd2a18ed3db195ecfa35e33455204af3321bd293e50d28a26c0634a6e20dadfba8228bb56
-
SSDEEP
3072:kxqZWZRanU2n0YLxE3I4Ge/N9PhhPxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jr:6qZgYLx+r5Ph
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-