General
-
Target
395b0e381403dfa2c0390aad9f6472dd56780351bf490484f849fc99bc7f460c
-
Size
478KB
-
Sample
230212-agd7taeg4y
-
MD5
e2a665f9bbc5913b1ae09cf020cef279
-
SHA1
f213806a271d7d07cfc0f2165d0048405f75863f
-
SHA256
395b0e381403dfa2c0390aad9f6472dd56780351bf490484f849fc99bc7f460c
-
SHA512
1d9a3c7565d002502a0c5164063c550552ec4164d25c93b5ffc0fc8dcccafd606fe76961a66e273f321f282753278150b94fb3feb7a9845df351fdaeab4c983b
-
SSDEEP
6144:KZy+bnr+Hp0yN90QEkp1l5zNLDwCc/PBrnFfQWjL8rKDhcM5vBXKDoHnyR7dmeyp:XMrvy90GpdzhwCc5nBACHhHO7graAw+
Static task
static1
Behavioral task
behavioral1
Sample
395b0e381403dfa2c0390aad9f6472dd56780351bf490484f849fc99bc7f460c.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Targets
-
-
Target
395b0e381403dfa2c0390aad9f6472dd56780351bf490484f849fc99bc7f460c
-
Size
478KB
-
MD5
e2a665f9bbc5913b1ae09cf020cef279
-
SHA1
f213806a271d7d07cfc0f2165d0048405f75863f
-
SHA256
395b0e381403dfa2c0390aad9f6472dd56780351bf490484f849fc99bc7f460c
-
SHA512
1d9a3c7565d002502a0c5164063c550552ec4164d25c93b5ffc0fc8dcccafd606fe76961a66e273f321f282753278150b94fb3feb7a9845df351fdaeab4c983b
-
SSDEEP
6144:KZy+bnr+Hp0yN90QEkp1l5zNLDwCc/PBrnFfQWjL8rKDhcM5vBXKDoHnyR7dmeyp:XMrvy90GpdzhwCc5nBACHhHO7graAw+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-