General
-
Target
4b9897370737dbdeaebf2a0cd79b7ad883c0ec62f662e22c57204d9368c24d65
-
Size
478KB
-
Sample
230212-c849esbg8x
-
MD5
173ca6cdca794f4e04d85d36ffd8829e
-
SHA1
4d2421f250d6987edadb1d942b0b3ce74d874916
-
SHA256
4b9897370737dbdeaebf2a0cd79b7ad883c0ec62f662e22c57204d9368c24d65
-
SHA512
4d025571626a87523a5566537d4d355af408efbc809e2bd9c5e8597144ae453f93ad2b580b36bb06097c3d10696f66809a7ed688774b6de7c7c8129520cbf89c
-
SSDEEP
12288:rMrwy90ajU/TO/NvPYBweWnYm6xcUwNHesprMf:fyNkTC5rJ+wN+Cof
Static task
static1
Behavioral task
behavioral1
Sample
4b9897370737dbdeaebf2a0cd79b7ad883c0ec62f662e22c57204d9368c24d65.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Targets
-
-
Target
4b9897370737dbdeaebf2a0cd79b7ad883c0ec62f662e22c57204d9368c24d65
-
Size
478KB
-
MD5
173ca6cdca794f4e04d85d36ffd8829e
-
SHA1
4d2421f250d6987edadb1d942b0b3ce74d874916
-
SHA256
4b9897370737dbdeaebf2a0cd79b7ad883c0ec62f662e22c57204d9368c24d65
-
SHA512
4d025571626a87523a5566537d4d355af408efbc809e2bd9c5e8597144ae453f93ad2b580b36bb06097c3d10696f66809a7ed688774b6de7c7c8129520cbf89c
-
SSDEEP
12288:rMrwy90ajU/TO/NvPYBweWnYm6xcUwNHesprMf:fyNkTC5rJ+wN+Cof
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-