General
-
Target
8c8011da0f0a4b8e3bcbaed88cf68d72845bdd40acb01b04054588854ed84ec3
-
Size
701KB
-
Sample
230217-c44r4ach7s
-
MD5
37512d2e53e7d7f90fdf07dd1861eaa3
-
SHA1
b12dcf048c95b772fc3f5ff9a376e96a3fd26f90
-
SHA256
8c8011da0f0a4b8e3bcbaed88cf68d72845bdd40acb01b04054588854ed84ec3
-
SHA512
e9b6497ada5b3164cd750b03e55647859f14a444432c22c16afbe3a4e57bb28059029b91478b263aa800d31f31cc502027bd9566c062418954b40868490da7e5
-
SSDEEP
12288:UMrmy90VgkV9rsXhVpN90z0yf35y/oM72RaXrJBZr0t3Xs3A6eClbWs1YjS:6y5kXqVfwh4oM7RrJvot3Klis3
Static task
static1
Behavioral task
behavioral1
Sample
8c8011da0f0a4b8e3bcbaed88cf68d72845bdd40acb01b04054588854ed84ec3.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Targets
-
-
Target
8c8011da0f0a4b8e3bcbaed88cf68d72845bdd40acb01b04054588854ed84ec3
-
Size
701KB
-
MD5
37512d2e53e7d7f90fdf07dd1861eaa3
-
SHA1
b12dcf048c95b772fc3f5ff9a376e96a3fd26f90
-
SHA256
8c8011da0f0a4b8e3bcbaed88cf68d72845bdd40acb01b04054588854ed84ec3
-
SHA512
e9b6497ada5b3164cd750b03e55647859f14a444432c22c16afbe3a4e57bb28059029b91478b263aa800d31f31cc502027bd9566c062418954b40868490da7e5
-
SSDEEP
12288:UMrmy90VgkV9rsXhVpN90z0yf35y/oM72RaXrJBZr0t3Xs3A6eClbWs1YjS:6y5kXqVfwh4oM7RrJvot3Klis3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-