General
-
Target
831e99f222464b12bc17abfaf0f7f21d399cb6c262bf6d05dd734e30f1f5d9db
-
Size
493KB
-
Sample
230211-tpecbsad9x
-
MD5
0e1e1e0977eecfbca114b1c2a50fc0b3
-
SHA1
2f23cd68a441c02fd6b5351804286d59a6d737c4
-
SHA256
831e99f222464b12bc17abfaf0f7f21d399cb6c262bf6d05dd734e30f1f5d9db
-
SHA512
c19adbbd31b22a0d524d82adf35ac9d1d7b0a13fa18df19f48e544bf61135dbb2f1c071708d75fa7eecb71df5f1d7438c5fd02a1200e9da6da47bc560e3dae9d
-
SSDEEP
12288:tMrly90KV75u42/f+297S065ws76qcVYSrt:gyTVdcfJ65h6puSZ
Static task
static1
Behavioral task
behavioral1
Sample
831e99f222464b12bc17abfaf0f7f21d399cb6c262bf6d05dd734e30f1f5d9db.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Targets
-
-
Target
831e99f222464b12bc17abfaf0f7f21d399cb6c262bf6d05dd734e30f1f5d9db
-
Size
493KB
-
MD5
0e1e1e0977eecfbca114b1c2a50fc0b3
-
SHA1
2f23cd68a441c02fd6b5351804286d59a6d737c4
-
SHA256
831e99f222464b12bc17abfaf0f7f21d399cb6c262bf6d05dd734e30f1f5d9db
-
SHA512
c19adbbd31b22a0d524d82adf35ac9d1d7b0a13fa18df19f48e544bf61135dbb2f1c071708d75fa7eecb71df5f1d7438c5fd02a1200e9da6da47bc560e3dae9d
-
SSDEEP
12288:tMrly90KV75u42/f+297S065ws76qcVYSrt:gyTVdcfJ65h6puSZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-