General
-
Target
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c
-
Size
550KB
-
Sample
230211-fe4mksff24
-
MD5
f2b4f55b10f1b93f69a69f6a7a7ee052
-
SHA1
703df74d9b2f3a068e55a923abcfcbc4f82a2062
-
SHA256
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c
-
SHA512
c45dc7b155dc1868f58a26a11f4aeb83c53c26320e9846ad4c4c5745223930c873cdba2e9a8af8d4bf249e51fe1b2ff0ad1b224a685d4e81bcb479dc1c9b7244
-
SSDEEP
12288:QMrIy90vhozQN1NRm+WbGjhVZRfCh5PMO+9q0dhM3WjBWC:IyChooOTbGZ45P4f+W9WC
Static task
static1
Behavioral task
behavioral1
Sample
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Targets
-
-
Target
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c
-
Size
550KB
-
MD5
f2b4f55b10f1b93f69a69f6a7a7ee052
-
SHA1
703df74d9b2f3a068e55a923abcfcbc4f82a2062
-
SHA256
a38fdb6d0bd07228d99b5ec5b6f71fcef825cbd638ae028864952bada16f2c5c
-
SHA512
c45dc7b155dc1868f58a26a11f4aeb83c53c26320e9846ad4c4c5745223930c873cdba2e9a8af8d4bf249e51fe1b2ff0ad1b224a685d4e81bcb479dc1c9b7244
-
SSDEEP
12288:QMrIy90vhozQN1NRm+WbGjhVZRfCh5PMO+9q0dhM3WjBWC:IyChooOTbGZ45P4f+W9WC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-