General
-
Target
8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4
-
Size
770KB
-
Sample
230213-l3926ace34
-
MD5
e5c9a8bc057e4d386d90d1e6bdae62ec
-
SHA1
5fbafda26bb5fe9d28ec4bfdecfa3ce4ea9b1e34
-
SHA256
8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4
-
SHA512
14fd8498c01676058c044a2151af95dd04f11b43591680269c98fec6efb915a264874895063ddc575efb75fd34e242d34ba9bee2ed8a1ec0c095f415818dada8
-
SSDEEP
12288:9Mrdy90A5bKtvbDIbHnfGM5RTtfW4u+H8eCE53QK3LyQEdaf/nAz00YLQxw:kyT5b2DIyi3tTH8eJhD7Xn4TYL
Static task
static1
Behavioral task
behavioral1
Sample
8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Targets
-
-
Target
8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4
-
Size
770KB
-
MD5
e5c9a8bc057e4d386d90d1e6bdae62ec
-
SHA1
5fbafda26bb5fe9d28ec4bfdecfa3ce4ea9b1e34
-
SHA256
8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4
-
SHA512
14fd8498c01676058c044a2151af95dd04f11b43591680269c98fec6efb915a264874895063ddc575efb75fd34e242d34ba9bee2ed8a1ec0c095f415818dada8
-
SSDEEP
12288:9Mrdy90A5bKtvbDIbHnfGM5RTtfW4u+H8eCE53QK3LyQEdaf/nAz00YLQxw:kyT5b2DIyi3tTH8eJhD7Xn4TYL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-