General
-
Target
89f2f5c6bfe57222e3d6684d970692b2b600fc000d454c563b50098dc9e328a2
-
Size
701KB
-
Sample
230217-b8zhhadc28
-
MD5
364cc5febe9285c81e5411b1aebf1bbc
-
SHA1
a4c698fc4eb9e1b48b9943fae351fda864515e49
-
SHA256
89f2f5c6bfe57222e3d6684d970692b2b600fc000d454c563b50098dc9e328a2
-
SHA512
173b3a746fac6228793641ad87fd1d132c9ce5a498a026ca3026143c55809566687be87b69c5d8c903686ec775073cb2789f294c0867407200692ab96196cb3a
-
SSDEEP
12288:HMruy90atGVlZC+LijxZEcrD5RUwMEgw+OekATp7sJi44ZWmKQXOX+k4U8VL:ByEVqZAcrD5RUwH+a+c4kuOX+k4UC
Static task
static1
Behavioral task
behavioral1
Sample
89f2f5c6bfe57222e3d6684d970692b2b600fc000d454c563b50098dc9e328a2.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Targets
-
-
Target
89f2f5c6bfe57222e3d6684d970692b2b600fc000d454c563b50098dc9e328a2
-
Size
701KB
-
MD5
364cc5febe9285c81e5411b1aebf1bbc
-
SHA1
a4c698fc4eb9e1b48b9943fae351fda864515e49
-
SHA256
89f2f5c6bfe57222e3d6684d970692b2b600fc000d454c563b50098dc9e328a2
-
SHA512
173b3a746fac6228793641ad87fd1d132c9ce5a498a026ca3026143c55809566687be87b69c5d8c903686ec775073cb2789f294c0867407200692ab96196cb3a
-
SSDEEP
12288:HMruy90atGVlZC+LijxZEcrD5RUwMEgw+OekATp7sJi44ZWmKQXOX+k4U8VL:ByEVqZAcrD5RUwH+a+c4kuOX+k4UC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-