General
-
Target
16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1
-
Size
323KB
-
Sample
231013-rfrj7acc43
-
MD5
eb99e041f108b8a2d7ce74b9e9225f63
-
SHA1
3eba8159e40b85829b2eaa26c6eae47b788208a3
-
SHA256
16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1
-
SHA512
138fda1511f945cb446452b56e930732c66c5e50f9d0869bcc7881186bd0fa387c23a5d2e6616a49b98bffe2e5e8de9ed1c4b71cb0ecaeeaa0e8fcc0d1f6c7af
-
SSDEEP
3072:r60VMBbY4gGRCvzOy0IigbVDeIlAIb2W0bkQkqoGIAQ3eYA/GEe0mj9jIuR:xVMBbIvgI9VyIlA22X7IQ/N+
Static task
static1
Behavioral task
behavioral1
Sample
16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
@octav1an
94.142.138.4:80
Targets
-
-
Target
16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1
-
Size
323KB
-
MD5
eb99e041f108b8a2d7ce74b9e9225f63
-
SHA1
3eba8159e40b85829b2eaa26c6eae47b788208a3
-
SHA256
16e17471e216b97b85b66e56f97cf60070a1cbce18b643a6d6cb7c215e1349d1
-
SHA512
138fda1511f945cb446452b56e930732c66c5e50f9d0869bcc7881186bd0fa387c23a5d2e6616a49b98bffe2e5e8de9ed1c4b71cb0ecaeeaa0e8fcc0d1f6c7af
-
SSDEEP
3072:r60VMBbY4gGRCvzOy0IigbVDeIlAIb2W0bkQkqoGIAQ3eYA/GEe0mj9jIuR:xVMBbIvgI9VyIlA22X7IQ/N+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-