General
-
Target
237753f97cf9e2f38e51064e6417abdbeb1e891507beac70578c450c96dfe74c
-
Size
1.2MB
-
Sample
230228-3m8mtsdc5x
-
MD5
8def183c26772b48841dbbe5f0aaf231
-
SHA1
a74dd7a29ae6d9622d765a9805ddb21f198d1b61
-
SHA256
237753f97cf9e2f38e51064e6417abdbeb1e891507beac70578c450c96dfe74c
-
SHA512
7efd46cd7dda18e430eb4086801229dee763e387a740482da0766a54874339e11e1fa7044e34b0fd2188f2d093a0b5ee2381f785e73579c62d32f43e1efbd753
-
SSDEEP
24576:oyqNEVdJCgaaAFH9DhDrwNYr+eEYjkJlkjcoP1zFckFWPxqG:vqNEcg8DprkYppjkJgcOVWP
Static task
static1
Behavioral task
behavioral1
Sample
237753f97cf9e2f38e51064e6417abdbeb1e891507beac70578c450c96dfe74c.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Targets
-
-
Target
237753f97cf9e2f38e51064e6417abdbeb1e891507beac70578c450c96dfe74c
-
Size
1.2MB
-
MD5
8def183c26772b48841dbbe5f0aaf231
-
SHA1
a74dd7a29ae6d9622d765a9805ddb21f198d1b61
-
SHA256
237753f97cf9e2f38e51064e6417abdbeb1e891507beac70578c450c96dfe74c
-
SHA512
7efd46cd7dda18e430eb4086801229dee763e387a740482da0766a54874339e11e1fa7044e34b0fd2188f2d093a0b5ee2381f785e73579c62d32f43e1efbd753
-
SSDEEP
24576:oyqNEVdJCgaaAFH9DhDrwNYr+eEYjkJlkjcoP1zFckFWPxqG:vqNEcg8DprkYppjkJgcOVWP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-