General
-
Target
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef
-
Size
472KB
-
Sample
230212-nxbnhsdb5w
-
MD5
a39579d351a04143699cba0f6ef5aa7e
-
SHA1
c25bfa74aab0a36856057eeed4a5e50bec2da3c6
-
SHA256
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef
-
SHA512
d1caa4a81ec1f3f1fcbc23b5b6b5077de5a18c2f5d7782e11bc7e9f484c916042bcccfe96b373d7e51d3ab16becacdaefdb369ab8ebec8f68dd562b5b1ffad39
-
SSDEEP
12288:YMr1y90/vhEP1VpCnIKUOEhwWfTmxVUueyozrnkWh:tyFNVrBOEhWcRycrvh
Static task
static1
Behavioral task
behavioral1
Sample
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Targets
-
-
Target
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef
-
Size
472KB
-
MD5
a39579d351a04143699cba0f6ef5aa7e
-
SHA1
c25bfa74aab0a36856057eeed4a5e50bec2da3c6
-
SHA256
86b9cf4824590be0c956691d27575b8726df7470c2894a33b885c277affdeaef
-
SHA512
d1caa4a81ec1f3f1fcbc23b5b6b5077de5a18c2f5d7782e11bc7e9f484c916042bcccfe96b373d7e51d3ab16becacdaefdb369ab8ebec8f68dd562b5b1ffad39
-
SSDEEP
12288:YMr1y90/vhEP1VpCnIKUOEhwWfTmxVUueyozrnkWh:tyFNVrBOEhWcRycrvh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-