General
-
Target
79bbb9df46df5f79d4f79dc64dfd9b12f646fc6a5fd1120e077974b521c538f4
-
Size
539KB
-
Sample
230217-gyrykaea94
-
MD5
08bcdf7a7620a8da5f8d319cdd0061b3
-
SHA1
5bd151ff5cb42f38991d84b12349715167c53dd5
-
SHA256
79bbb9df46df5f79d4f79dc64dfd9b12f646fc6a5fd1120e077974b521c538f4
-
SHA512
08ec8dc2429784a9c2641f1af844a13c800af2cd45f5cc1d1781fbb77720234e4f7e608b82d35ba0aa98b2d9fa5d1b68622fee020ffa7056f1183915475f9f16
-
SSDEEP
12288:wMrky90yX9RLRxkaJZINE4e9Ht0e6C1731lgo:EyxXTLRfJ2pe1d6C17Tgo
Static task
static1
Behavioral task
behavioral1
Sample
79bbb9df46df5f79d4f79dc64dfd9b12f646fc6a5fd1120e077974b521c538f4.exe
Resource
win10-20220812-en
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
79bbb9df46df5f79d4f79dc64dfd9b12f646fc6a5fd1120e077974b521c538f4
-
Size
539KB
-
MD5
08bcdf7a7620a8da5f8d319cdd0061b3
-
SHA1
5bd151ff5cb42f38991d84b12349715167c53dd5
-
SHA256
79bbb9df46df5f79d4f79dc64dfd9b12f646fc6a5fd1120e077974b521c538f4
-
SHA512
08ec8dc2429784a9c2641f1af844a13c800af2cd45f5cc1d1781fbb77720234e4f7e608b82d35ba0aa98b2d9fa5d1b68622fee020ffa7056f1183915475f9f16
-
SSDEEP
12288:wMrky90yX9RLRxkaJZINE4e9Ht0e6C1731lgo:EyxXTLRfJ2pe1d6C17Tgo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-