General
-
Target
0b40969e72a4dfd32110a8627fe8ef9e.bin
-
Size
1.0MB
-
Sample
230301-bcrssade3x
-
MD5
402bda7689e6df1b9b26f192098b2bcb
-
SHA1
d3ddf9843590c2825963d0bd141f4e5433e75cae
-
SHA256
111f9c4bd519d34170d357f591b2ba4f917f35161778a8ef5854597975916ae2
-
SHA512
9cedc164cd28b8a1f53cc354bd54f2b65aadba5767e7db7b95ffbc4868398dc2c0d0cc7bab3e0b6200b83782444a14827cbe7bbe30c6e2a1182e7fc3cfbfb885
-
SSDEEP
24576:wheyByHf25a5qjO0DQMlpguG5zxxf1IudU8Ii3Nqn0nb:w8yB95goznCndIuOtidhb
Static task
static1
Behavioral task
behavioral1
Sample
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe
-
Size
1.1MB
-
MD5
0b40969e72a4dfd32110a8627fe8ef9e
-
SHA1
c39532bc3fbe15738f39a59af3a4a35825019dd0
-
SHA256
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db
-
SHA512
bc5f93fb5b48347448ec393269233b1f08ab33d71f28cd859d9a1e32311364cf3ea8816cf35be8a48859919178dca29f0a1fedc10906a30c72c9ce4855fba4a9
-
SSDEEP
24576:eyKibSWKaFdUoVlynQ2y4hRqoXg9jzVnH+FSp4G:tvbSonUoXz2JGoXg9jqSp4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-