General
-
Target
861fef9e6aafcc669b4cb5da2c73520ef812f7b4bff7d6f393e3ba2c09b71d38
-
Size
579KB
-
Sample
230214-z9j17sgc88
-
MD5
cedeb6cd97e46e98ba6d662f52dd5e18
-
SHA1
1474ac4e6664bee15524c429125469e3b380f247
-
SHA256
861fef9e6aafcc669b4cb5da2c73520ef812f7b4bff7d6f393e3ba2c09b71d38
-
SHA512
a148e0a927ce8a72d7563754b1f710dff066e35eb686b652aa1858e2884d6ca09765b945281bc79492eecbfbc6855a16d19bdd84708d1b12d86ecaf546b0311b
-
SSDEEP
12288:mMrXy90+2Vv+GvnAKV3zRZd67oxPoTnpU9k3SpZk0/VyUmn:tyoVFnAa7d60W98D6Umn
Static task
static1
Behavioral task
behavioral1
Sample
861fef9e6aafcc669b4cb5da2c73520ef812f7b4bff7d6f393e3ba2c09b71d38.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Targets
-
-
Target
861fef9e6aafcc669b4cb5da2c73520ef812f7b4bff7d6f393e3ba2c09b71d38
-
Size
579KB
-
MD5
cedeb6cd97e46e98ba6d662f52dd5e18
-
SHA1
1474ac4e6664bee15524c429125469e3b380f247
-
SHA256
861fef9e6aafcc669b4cb5da2c73520ef812f7b4bff7d6f393e3ba2c09b71d38
-
SHA512
a148e0a927ce8a72d7563754b1f710dff066e35eb686b652aa1858e2884d6ca09765b945281bc79492eecbfbc6855a16d19bdd84708d1b12d86ecaf546b0311b
-
SSDEEP
12288:mMrXy90+2Vv+GvnAKV3zRZd67oxPoTnpU9k3SpZk0/VyUmn:tyoVFnAa7d60W98D6Umn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-