General
-
Target
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e
-
Size
859KB
-
Sample
230215-qs8hssbh55
-
MD5
004072e8f50474e0714f5eca5f9f5d68
-
SHA1
b86bc97446ed5c88702507dd15bc15f1f249c551
-
SHA256
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e
-
SHA512
2be970735772cbdc00d4a37022d2b2c81c2bab682cc30a9aaedb16306fd5028da18b94eb67e9df74b9e27839b33846630064479ac060482784a22d214639a07c
-
SSDEEP
24576:2yNoYjpxJ6YCbeRDpW5HcUIHLeCvTTTGShxw1Y9TD:FNoYjpxPbDpW58ZeCvTd/w1
Static task
static1
Behavioral task
behavioral1
Sample
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Targets
-
-
Target
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e
-
Size
859KB
-
MD5
004072e8f50474e0714f5eca5f9f5d68
-
SHA1
b86bc97446ed5c88702507dd15bc15f1f249c551
-
SHA256
1eedec8c0566aeeca66054494aaa06b1e7c99ce1ebfaf5e698d73a2421706d7e
-
SHA512
2be970735772cbdc00d4a37022d2b2c81c2bab682cc30a9aaedb16306fd5028da18b94eb67e9df74b9e27839b33846630064479ac060482784a22d214639a07c
-
SSDEEP
24576:2yNoYjpxJ6YCbeRDpW5HcUIHLeCvTTTGShxw1Y9TD:FNoYjpxPbDpW58ZeCvTd/w1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-