General
-
Target
da4e6669a8122e69b61178f40cb4c3bbdc825329ec00f032f7acf812806983bb
-
Size
701KB
-
Sample
230217-acrbkscg36
-
MD5
a46179974a6a1464ca578e0d16e36a17
-
SHA1
684d7d5418cf6490dd229add50b739b0adf0fcad
-
SHA256
da4e6669a8122e69b61178f40cb4c3bbdc825329ec00f032f7acf812806983bb
-
SHA512
b61659f63121bdccafa44fba4769fb9091c2b96ca53c761e070720a0d71d0855218c9acc1c872dd8d1f9a2adb2aa74afc83206b60308c71bfa1d54827ce8003d
-
SSDEEP
12288:PMr9y90gAczz7vK6l0eyLPd1T3YQ34q8NvcEdt2ZbsztSeQWPGvf8qO:aynHzvSCyLPd1T3L34TkhsztjQWuvfJO
Static task
static1
Behavioral task
behavioral1
Sample
da4e6669a8122e69b61178f40cb4c3bbdc825329ec00f032f7acf812806983bb.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Targets
-
-
Target
da4e6669a8122e69b61178f40cb4c3bbdc825329ec00f032f7acf812806983bb
-
Size
701KB
-
MD5
a46179974a6a1464ca578e0d16e36a17
-
SHA1
684d7d5418cf6490dd229add50b739b0adf0fcad
-
SHA256
da4e6669a8122e69b61178f40cb4c3bbdc825329ec00f032f7acf812806983bb
-
SHA512
b61659f63121bdccafa44fba4769fb9091c2b96ca53c761e070720a0d71d0855218c9acc1c872dd8d1f9a2adb2aa74afc83206b60308c71bfa1d54827ce8003d
-
SSDEEP
12288:PMr9y90gAczz7vK6l0eyLPd1T3YQ34q8NvcEdt2ZbsztSeQWPGvf8qO:aynHzvSCyLPd1T3L34TkhsztjQWuvfJO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-