General
-
Target
c68303500a2914ee7806ce32b6916d33a77c16bc97201786663c70cc2359e4d0
-
Size
1.1MB
-
Sample
230301-1f4n7ahh2w
-
MD5
d825549e11f352c2fca685a65e9e0d2e
-
SHA1
60f85ea63e48693f9d4e9186b9181546b5cc3b62
-
SHA256
c68303500a2914ee7806ce32b6916d33a77c16bc97201786663c70cc2359e4d0
-
SHA512
8bdd61eb130aeadb7098b640585e4dbd77935db631bd7000e1c2fc3e3d783a2006d2aa7a3760eaec239e5ad19853084e07d655745aeb4fb11df9cd7a16d128e9
-
SSDEEP
24576:iyBsVx3DbPIh08Ub78/yAlLoD9+rHAAeiy26Oz1Ec3CF9QgDK4AQr+gKS2wY:JBsfDbW08ZyAlLoMTAwyHY1EoCpK4V5
Static task
static1
Behavioral task
behavioral1
Sample
c68303500a2914ee7806ce32b6916d33a77c16bc97201786663c70cc2359e4d0.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
durov
193.56.146.11:4162
-
auth_value
337984645d237df105d30aab7013119f
Targets
-
-
Target
c68303500a2914ee7806ce32b6916d33a77c16bc97201786663c70cc2359e4d0
-
Size
1.1MB
-
MD5
d825549e11f352c2fca685a65e9e0d2e
-
SHA1
60f85ea63e48693f9d4e9186b9181546b5cc3b62
-
SHA256
c68303500a2914ee7806ce32b6916d33a77c16bc97201786663c70cc2359e4d0
-
SHA512
8bdd61eb130aeadb7098b640585e4dbd77935db631bd7000e1c2fc3e3d783a2006d2aa7a3760eaec239e5ad19853084e07d655745aeb4fb11df9cd7a16d128e9
-
SSDEEP
24576:iyBsVx3DbPIh08Ub78/yAlLoD9+rHAAeiy26Oz1Ec3CF9QgDK4AQr+gKS2wY:JBsfDbW08ZyAlLoMTAwyHY1EoCpK4V5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-