General
-
Target
031907cc7c4110bef4f7a36c95c26aa1a8155293e49c1d1c6851b477aff693bf.exe
-
Size
459KB
-
Sample
240526-jwpfrscg47
-
MD5
07c57ef6bdc91e2b41f1b2f66a8a7454
-
SHA1
6d692cb77f5e42a9dc6c87e9909f23960300a750
-
SHA256
031907cc7c4110bef4f7a36c95c26aa1a8155293e49c1d1c6851b477aff693bf
-
SHA512
710429aa161e94c10e6b02c678fc74541ba68e0fd5a223dcb953b32d145cb6c2e6b26a1e44cddc48768b53918cb28fb3e438ff7d6e9b68016ffc7d19c4f84077
-
SSDEEP
12288:krGmtDcvAPVLiZhv2dMe6y5rkJ2h7tfmee:qD7PVWZV+9kJg7z
Static task
static1
Behavioral task
behavioral1
Sample
031907cc7c4110bef4f7a36c95c26aa1a8155293e49c1d1c6851b477aff693bf.exe
Resource
win7-20240508-en
Malware Config
Extracted
redline
@OLEH_PSP
185.172.128.33:8970
Targets
-
-
Target
031907cc7c4110bef4f7a36c95c26aa1a8155293e49c1d1c6851b477aff693bf.exe
-
Size
459KB
-
MD5
07c57ef6bdc91e2b41f1b2f66a8a7454
-
SHA1
6d692cb77f5e42a9dc6c87e9909f23960300a750
-
SHA256
031907cc7c4110bef4f7a36c95c26aa1a8155293e49c1d1c6851b477aff693bf
-
SHA512
710429aa161e94c10e6b02c678fc74541ba68e0fd5a223dcb953b32d145cb6c2e6b26a1e44cddc48768b53918cb28fb3e438ff7d6e9b68016ffc7d19c4f84077
-
SSDEEP
12288:krGmtDcvAPVLiZhv2dMe6y5rkJ2h7tfmee:qD7PVWZV+9kJg7z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-