General
-
Target
7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d
-
Size
501KB
-
Sample
231030-p71k3aeg92
-
MD5
ba5e9d2e62f5e1ed6198f7f80f28862d
-
SHA1
36fb5e81eb10c141dee03703bb27cf3b63a6193a
-
SHA256
7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d
-
SHA512
6faacd60e54642b5444b712db7534be1886e9347a9e151264475e72abf17eede931c3f1b8d171d5ef2903c5aa98af7321f4a6721d053f8bee02790ebc9b79b65
-
SSDEEP
12288:F01DoqN4lVVE6nZH4zVAlFTO2uONvnoYZvcL:Fo43VErOBDnoYZvcL
Static task
static1
Behavioral task
behavioral1
Sample
7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d.exe
Resource
win10-20231025-en
Malware Config
Targets
-
-
Target
7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d
-
Size
501KB
-
MD5
ba5e9d2e62f5e1ed6198f7f80f28862d
-
SHA1
36fb5e81eb10c141dee03703bb27cf3b63a6193a
-
SHA256
7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d
-
SHA512
6faacd60e54642b5444b712db7534be1886e9347a9e151264475e72abf17eede931c3f1b8d171d5ef2903c5aa98af7321f4a6721d053f8bee02790ebc9b79b65
-
SSDEEP
12288:F01DoqN4lVVE6nZH4zVAlFTO2uONvnoYZvcL:Fo43VErOBDnoYZvcL
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-