General
-
Target
732ef889507ec5d25ebc37df046636630ff3688bbc31791222768c37e12adf3a
-
Size
474KB
-
Sample
230213-2t6w5sgh65
-
MD5
d52e36bea505f6b3667df7bf952ac605
-
SHA1
65bd420affa9b922a094c5a484c0b5d11cb96497
-
SHA256
732ef889507ec5d25ebc37df046636630ff3688bbc31791222768c37e12adf3a
-
SHA512
4e9aefa5c342f85e3586099f495970375ddaaba1bb9adc6130be54df3654ded02993fbcb75cc57dca6ef0a85d232ba6804c7f4defff41f8013caae5bc648ec4e
-
SSDEEP
6144:Khy+bnr+Yp0yN90QEBIYWiz08QlRuPsYzz7xlPJXmhjx+5wqWoWKMScl6XkN5HkQ:DMrcy90xz0Sz3HJAx+5WoWKRjkN5EBm
Static task
static1
Behavioral task
behavioral1
Sample
732ef889507ec5d25ebc37df046636630ff3688bbc31791222768c37e12adf3a.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Targets
-
-
Target
732ef889507ec5d25ebc37df046636630ff3688bbc31791222768c37e12adf3a
-
Size
474KB
-
MD5
d52e36bea505f6b3667df7bf952ac605
-
SHA1
65bd420affa9b922a094c5a484c0b5d11cb96497
-
SHA256
732ef889507ec5d25ebc37df046636630ff3688bbc31791222768c37e12adf3a
-
SHA512
4e9aefa5c342f85e3586099f495970375ddaaba1bb9adc6130be54df3654ded02993fbcb75cc57dca6ef0a85d232ba6804c7f4defff41f8013caae5bc648ec4e
-
SSDEEP
6144:Khy+bnr+Yp0yN90QEBIYWiz08QlRuPsYzz7xlPJXmhjx+5wqWoWKMScl6XkN5HkQ:DMrcy90xz0Sz3HJAx+5WoWKRjkN5EBm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-