General
-
Target
7e72224b64914f03a0b31d855c6e9a48fa51cd1cae374ecc9a6bff8506f445e6
-
Size
481KB
-
Sample
230213-pwpdnadc23
-
MD5
95acb0b078d6fec01af5fc1b64e6d2e5
-
SHA1
ecc4e06ca129dd166b7a30152fe003149225643a
-
SHA256
7e72224b64914f03a0b31d855c6e9a48fa51cd1cae374ecc9a6bff8506f445e6
-
SHA512
5c17b3cd4c54a0b8654b370593216d8c6a833073a299752aed62f755e97c96fdfb38838115ad1fcd166a85df669709db0c63fdc942bfdad46e3b95afda40504b
-
SSDEEP
12288:QMr9y90iIC96EgGHMln/4ezY+0aQS0BBU20c:9yrD6tGHu/48Y+0XS0BBUJc
Static task
static1
Behavioral task
behavioral1
Sample
7e72224b64914f03a0b31d855c6e9a48fa51cd1cae374ecc9a6bff8506f445e6.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Targets
-
-
Target
7e72224b64914f03a0b31d855c6e9a48fa51cd1cae374ecc9a6bff8506f445e6
-
Size
481KB
-
MD5
95acb0b078d6fec01af5fc1b64e6d2e5
-
SHA1
ecc4e06ca129dd166b7a30152fe003149225643a
-
SHA256
7e72224b64914f03a0b31d855c6e9a48fa51cd1cae374ecc9a6bff8506f445e6
-
SHA512
5c17b3cd4c54a0b8654b370593216d8c6a833073a299752aed62f755e97c96fdfb38838115ad1fcd166a85df669709db0c63fdc942bfdad46e3b95afda40504b
-
SSDEEP
12288:QMr9y90iIC96EgGHMln/4ezY+0aQS0BBU20c:9yrD6tGHu/48Y+0XS0BBUJc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-