General
-
Target
361b53f4b3e887b963bd607d994f9f42344b39e871b1142c8e56ff7182e4c96c.zip
-
Size
1.2MB
-
Sample
240402-qbgczsae61
-
MD5
1bb5a2dc6a23791434ba7ab2a06f7a00
-
SHA1
2d8c88fdb1e972d9f014176e4af9aaff0fc9a119
-
SHA256
723375edab4b238a74fdb9af65f39625ab01bf64fc9a8240c50f33d43706f2a1
-
SHA512
4a18affdf2fd0dc8f087bb05e3364afbdf5e3087ef0930bf3837f4e5a00bbdd7291811bedd0748ea35cdb2c3756e187db746f6a75fa1516ac4d7484eea5bf9ce
-
SSDEEP
24576:U5/s4QFNU+68YFDeSa7B8GlomIlntgrE3VFyONDRuRJC0VRZSFH4MmiX:YyN07xFa98komIFtAElgWFdaRZSFH4J4
Static task
static1
Behavioral task
behavioral1
Sample
361b53f4b3e887b963bd607d994f9f42344b39e871b1142c8e56ff7182e4c96c.exe
Resource
win7-20240221-en
Malware Config
Extracted
redline
1
77.221.156.45:18734
Targets
-
-
Target
361b53f4b3e887b963bd607d994f9f42344b39e871b1142c8e56ff7182e4c96c.exe
-
Size
1.3MB
-
MD5
48bf3772cbc93109287d1254b8a64683
-
SHA1
7ba5be5f07d63597c71bdfc0032365b56a3a26e7
-
SHA256
361b53f4b3e887b963bd607d994f9f42344b39e871b1142c8e56ff7182e4c96c
-
SHA512
d3621ed393be35d7a0074aee36d7ab1e7df9dacb86085472c8ed0cceec03e0bd2b349b9216bd3b8f1c19f9b1f112e255245d38ad32106d0e47a92e27ebe41d15
-
SSDEEP
24576:Nmmy8RvF09ha/j20zJgxHgShHls6P9eQ7FYxM8/ta081:N/y8RvK9Q9B76PZ7GxM8/tJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-