General
-
Target
9a500389599742761a169a3177c632276c733f21e72450b25b3cc33fd74b36df
-
Size
853KB
-
Sample
230214-2t7tfagg25
-
MD5
e3b831025da55214534edbe7690c3d51
-
SHA1
975d832e3fd286f71cc1a7e1cc4e7bfedf974ca8
-
SHA256
9a500389599742761a169a3177c632276c733f21e72450b25b3cc33fd74b36df
-
SHA512
fe1f5b347d6dcac9b8877a5e17120d1a614eb41ae08d0b7c8fe6bfb82fe20089d6e424e27eda1dd88e81940200992361dab808258abfa7796bb6d7aa48d8f703
-
SSDEEP
24576:Xyp7sLfgJc3RlngMh6oK9WjoXY04ShR1:iSbgShlngM8XXXR/
Static task
static1
Behavioral task
behavioral1
Sample
9a500389599742761a169a3177c632276c733f21e72450b25b3cc33fd74b36df.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Targets
-
-
Target
9a500389599742761a169a3177c632276c733f21e72450b25b3cc33fd74b36df
-
Size
853KB
-
MD5
e3b831025da55214534edbe7690c3d51
-
SHA1
975d832e3fd286f71cc1a7e1cc4e7bfedf974ca8
-
SHA256
9a500389599742761a169a3177c632276c733f21e72450b25b3cc33fd74b36df
-
SHA512
fe1f5b347d6dcac9b8877a5e17120d1a614eb41ae08d0b7c8fe6bfb82fe20089d6e424e27eda1dd88e81940200992361dab808258abfa7796bb6d7aa48d8f703
-
SSDEEP
24576:Xyp7sLfgJc3RlngMh6oK9WjoXY04ShR1:iSbgShlngM8XXXR/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-