General
-
Target
593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132.zip
-
Size
51KB
-
Sample
230329-sv18lsgh26
-
MD5
818795c60c0e74dc0fd978c553b65bf4
-
SHA1
416c1c78f96c360db3baf8a6d2c102a2ab04c387
-
SHA256
35d83d51625fa30384b4e982b6decc19ad34f01336d8c77b853a765875cc87f1
-
SHA512
56e68c7058209dd329d225a58770b6159ff55bb12177671bf060483f21aba6d096a9d889187567969be9b41b79ec63d6e160c1ce23f177613236ffd8a42bac68
-
SSDEEP
768:C/buWmSrFJW1Pi2P8MxmJ+zG9tclVeDM43jyFZdcsybuvkG7JKjVLdg5cCjTjPNN:GFJ+ApJSblVeDF0d8G7AuJTTtKTTiL
Behavioral task
behavioral1
Sample
593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
volya
193.233.20.31:4125
-
auth_value
0efc9f002a9fbeec5f8b8338141d546a
Targets
-
-
Target
593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132
-
Size
175KB
-
MD5
018b839c5ea1438099cd92f268570005
-
SHA1
5c962942d01b46556c5f3d88a51ab865c051418c
-
SHA256
593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132
-
SHA512
67d7a260d200127fe6a6c0dee2bfdd6f84f6bdf3778a8033ae0d51eee1cd717328dba6ee4aff07e4522466317e790f7cd94440fe31adca06269db3d279c31010
-
SSDEEP
3072:ZxqZW11a2kX8fPhSRFT/R/rPvBGb+eQcFbhsnxNn2pU9f2MKTV/wi4lr55R9TxlF:LqZkP8BPvY1bh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-