General
-
Target
b5451ea81c5ad07c10c61b2ffe9838b8e194f49e6e3756f5747e1df95d25ff4f
-
Size
480KB
-
Sample
230213-k7tejabe81
-
MD5
37ef0855ebf7a7b4ad949b470b32b27b
-
SHA1
d8f926a7f7131d65ae9ec321de2c71e2cd9e5a3a
-
SHA256
b5451ea81c5ad07c10c61b2ffe9838b8e194f49e6e3756f5747e1df95d25ff4f
-
SHA512
1bfa047d8d4eb2e044775e2b9120adba4ffd3619f95f8ab0793119d9ffa789beb17541f1017f45c7d7365c452691ff64695966c9e9474b9895d18cd3fb0be116
-
SSDEEP
6144:KNy+bnr+Yp0yN90QEfuLgJsho8vgJ42+CkVy4h6AKbmN+DotjQf0c0p/KAlEUSWc:3Mrgy90ZsK8IJCVP8AKKYurpykE96FM
Static task
static1
Behavioral task
behavioral1
Sample
b5451ea81c5ad07c10c61b2ffe9838b8e194f49e6e3756f5747e1df95d25ff4f.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Targets
-
-
Target
b5451ea81c5ad07c10c61b2ffe9838b8e194f49e6e3756f5747e1df95d25ff4f
-
Size
480KB
-
MD5
37ef0855ebf7a7b4ad949b470b32b27b
-
SHA1
d8f926a7f7131d65ae9ec321de2c71e2cd9e5a3a
-
SHA256
b5451ea81c5ad07c10c61b2ffe9838b8e194f49e6e3756f5747e1df95d25ff4f
-
SHA512
1bfa047d8d4eb2e044775e2b9120adba4ffd3619f95f8ab0793119d9ffa789beb17541f1017f45c7d7365c452691ff64695966c9e9474b9895d18cd3fb0be116
-
SSDEEP
6144:KNy+bnr+Yp0yN90QEfuLgJsho8vgJ42+CkVy4h6AKbmN+DotjQf0c0p/KAlEUSWc:3Mrgy90ZsK8IJCVP8AKKYurpykE96FM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-