General
-
Target
adbb3af0d2fe8f2e90e06178428ea701a81cce37586d09706fca276c408b0318
-
Size
820KB
-
Sample
230215-3hgzbaeg23
-
MD5
18a7315c002bdf9991776f504ae7f5ce
-
SHA1
7384fc125b9045b2503002ce7fad75972f927fb1
-
SHA256
adbb3af0d2fe8f2e90e06178428ea701a81cce37586d09706fca276c408b0318
-
SHA512
37d3f0927483653f17c4f2aa1b7cd04e69643d148cee02fa3d4d01c0bc6d70f98569348ebee1f58113631f76c0f129d15819b8de0b4061c5f86c19d54096b98a
-
SSDEEP
12288:uMrFy901P+jjqdBGaccfFC7jP0Y3sOUYSwbxNH+DWX/MHIi9CzCtw6vuOUkx4:PymGjIBoks7b3sOtSaBNXi9SN6WOlx4
Static task
static1
Behavioral task
behavioral1
Sample
adbb3af0d2fe8f2e90e06178428ea701a81cce37586d09706fca276c408b0318.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Targets
-
-
Target
adbb3af0d2fe8f2e90e06178428ea701a81cce37586d09706fca276c408b0318
-
Size
820KB
-
MD5
18a7315c002bdf9991776f504ae7f5ce
-
SHA1
7384fc125b9045b2503002ce7fad75972f927fb1
-
SHA256
adbb3af0d2fe8f2e90e06178428ea701a81cce37586d09706fca276c408b0318
-
SHA512
37d3f0927483653f17c4f2aa1b7cd04e69643d148cee02fa3d4d01c0bc6d70f98569348ebee1f58113631f76c0f129d15819b8de0b4061c5f86c19d54096b98a
-
SSDEEP
12288:uMrFy901P+jjqdBGaccfFC7jP0Y3sOUYSwbxNH+DWX/MHIi9CzCtw6vuOUkx4:PymGjIBoks7b3sOtSaBNXi9SN6WOlx4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-