General
-
Target
2a77755360e6603e59d8fe1ca50909d1ac8460d31a4efa20d46381178904a20a.zip
-
Size
51KB
-
Sample
230329-srvawsad8t
-
MD5
9783fa3b314d0afa479b90853bb90621
-
SHA1
ec7e1eca877fddfdacfc967b8ac10c3cdbcf310e
-
SHA256
22e3205b00745ccf0fd1d42eb9ac6c4e0a172427d15fbf798c2b67e67c7afb8e
-
SHA512
81f46c6fd1ae282f90d4710ed91f99d462dd58a33fce8b86107202302179e49f3a481263806d85ebf8f734e8bfc9a2f9af9d02442c6cfc2ba58fa6e74a0fb832
-
SSDEEP
1536:tfZlP+MHWztHF9HVO0tvYDG9aiIJSghnuBu:5+MHQFHvtKLvhuBu
Behavioral task
behavioral1
Sample
2a77755360e6603e59d8fe1ca50909d1ac8460d31a4efa20d46381178904a20a.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
2a77755360e6603e59d8fe1ca50909d1ac8460d31a4efa20d46381178904a20a
-
Size
175KB
-
MD5
2017c2a6a8c4cdc010050764a9b46f51
-
SHA1
04b3aa3f67c121c1d6e818255bf3a14047ece1dc
-
SHA256
2a77755360e6603e59d8fe1ca50909d1ac8460d31a4efa20d46381178904a20a
-
SHA512
43dc85148529eb68aef8d25723c129653f73c5ff9519c1e6c1a5a1872dd872509239976a2e41560d759ac602772c157cc3ad9f0aa8a865eb979eb1dda9adf01c
-
SSDEEP
3072:4xqZWZRanU2n0/Z62eJ5evJ9ih+PxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOm:mqZg/Z6XJIih
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-