General
-
Target
0e11e28052f38e776c2ab9541c02db45f76ad51e044970e5bdb2a22502094b72
-
Size
546KB
-
Sample
230301-aw42sadd6w
-
MD5
4c9e5fb50a749d17907ab9bc98014b4d
-
SHA1
501080cf81af00edbe96e6c4cb0a1ad3adef2d26
-
SHA256
0e11e28052f38e776c2ab9541c02db45f76ad51e044970e5bdb2a22502094b72
-
SHA512
38cc854f995752b9ac2fb1f9bc2fe74d2bc5380d901f63fecccbd226e09809ca0b240fa7d67b082e3c99481a3c5ee4e6ed7ff0879366a29603e1c793f2b3a52b
-
SSDEEP
12288:TMrcy90Gk/1tgRga4u3slZ9pw/uQZYmL1gY5iRLWx1/f:PyRk/1tgS7SsrbSZYy1gY5iJWf/f
Static task
static1
Behavioral task
behavioral1
Sample
0e11e28052f38e776c2ab9541c02db45f76ad51e044970e5bdb2a22502094b72.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
0e11e28052f38e776c2ab9541c02db45f76ad51e044970e5bdb2a22502094b72
-
Size
546KB
-
MD5
4c9e5fb50a749d17907ab9bc98014b4d
-
SHA1
501080cf81af00edbe96e6c4cb0a1ad3adef2d26
-
SHA256
0e11e28052f38e776c2ab9541c02db45f76ad51e044970e5bdb2a22502094b72
-
SHA512
38cc854f995752b9ac2fb1f9bc2fe74d2bc5380d901f63fecccbd226e09809ca0b240fa7d67b082e3c99481a3c5ee4e6ed7ff0879366a29603e1c793f2b3a52b
-
SSDEEP
12288:TMrcy90Gk/1tgRga4u3slZ9pw/uQZYmL1gY5iRLWx1/f:PyRk/1tgS7SsrbSZYy1gY5iJWf/f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-