General
-
Target
799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb
-
Size
1006KB
-
Sample
241003-2g3zqatfna
-
MD5
c005d4ffa3e28c22b41a9d222598260a
-
SHA1
57cc3a6540bc38c649ddfdd54fa4f3c8a2423677
-
SHA256
799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb
-
SHA512
ce39903c46160deeee1c7b362000361a3f5a9243b2e180bbaafa5b8ab09cc09ca413ce32f4deb2074fa928110d25b3dae7465c849fc388a58ddf649a9caa3a68
-
SSDEEP
24576:WdZE+NmjQ5WymWeoSAj6YztpJF+6Xkb1rlNF:YZbAjQ5WZW2KNFNXmF
Static task
static1
Behavioral task
behavioral1
Sample
799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
@OLEH_PSP
65.21.18.51:45580
Targets
-
-
Target
799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb
-
Size
1006KB
-
MD5
c005d4ffa3e28c22b41a9d222598260a
-
SHA1
57cc3a6540bc38c649ddfdd54fa4f3c8a2423677
-
SHA256
799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb
-
SHA512
ce39903c46160deeee1c7b362000361a3f5a9243b2e180bbaafa5b8ab09cc09ca413ce32f4deb2074fa928110d25b3dae7465c849fc388a58ddf649a9caa3a68
-
SSDEEP
24576:WdZE+NmjQ5WymWeoSAj6YztpJF+6Xkb1rlNF:YZbAjQ5WZW2KNFNXmF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2