General
-
Target
5e0c5ad71f90e98a0d2778a371a55e28.exe
-
Size
506KB
-
Sample
240501-mty4zafc74
-
MD5
5e0c5ad71f90e98a0d2778a371a55e28
-
SHA1
050c043a033c61a98f6de039a8a274dd688cb1f8
-
SHA256
3c285e783df8fe492b0ee90a41f58706f4913a3da6649a75331fcf08126078d7
-
SHA512
49ec775455350e4bced4bad800755912acf9fbd56017e244958c591a47b4746342814193b1765d8ed51fd89bf048355503cc80c9ccceefd4d009e84158b7b0f7
-
SSDEEP
6144:jzFBcUgZicw+kNCKEoCV6Xd1OLllUj9rUNssRoLKuzfNpgPMZ3Vix3+u4t8bN:jlSicwWKpTBjWNDRLuoPgu4ubN
Static task
static1
Behavioral task
behavioral1
Sample
5e0c5ad71f90e98a0d2778a371a55e28.exe
Resource
win7-20240419-en
Malware Config
Extracted
redline
SAMP
147.45.47.36:39849
Targets
-
-
Target
5e0c5ad71f90e98a0d2778a371a55e28.exe
-
Size
506KB
-
MD5
5e0c5ad71f90e98a0d2778a371a55e28
-
SHA1
050c043a033c61a98f6de039a8a274dd688cb1f8
-
SHA256
3c285e783df8fe492b0ee90a41f58706f4913a3da6649a75331fcf08126078d7
-
SHA512
49ec775455350e4bced4bad800755912acf9fbd56017e244958c591a47b4746342814193b1765d8ed51fd89bf048355503cc80c9ccceefd4d009e84158b7b0f7
-
SSDEEP
6144:jzFBcUgZicw+kNCKEoCV6Xd1OLllUj9rUNssRoLKuzfNpgPMZ3Vix3+u4t8bN:jlSicwWKpTBjWNDRLuoPgu4ubN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-