General
-
Target
1dec159951f1abc187f8291376f46231.bin
-
Size
482KB
-
Sample
230301-bgb8wsdh86
-
MD5
c1f66fbf506c33d5dedddaa0fbd545b1
-
SHA1
1042fc127d711bf2641115b354819e00d44f2bf3
-
SHA256
578b0a00af3e8c4387b2dfdbdb791f2ca6018cd6bc555b397eaa472fa9496a04
-
SHA512
d88e765705903f20ccff440acf39d7487a29ece70d315393ba2db86e655c89c1bcc4f42e49ea4b4ca9fc3d85d52895f7e2cf90f96e10738d21564247a07f1c5c
-
SSDEEP
12288:izYvrQKEnQ6uGwEFttPE+KirungSJc8TUXJhI53bqd:+YvkKhX6ttUAugSJcaKJhIsd
Static task
static1
Behavioral task
behavioral1
Sample
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe
-
Size
532KB
-
MD5
1dec159951f1abc187f8291376f46231
-
SHA1
8eaf537891990be712cbe885981bac83cd86060b
-
SHA256
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc
-
SHA512
5d0e7792a464718629981dbf260d537b3de895f62a4d94b35ace15ecd05120f5fef3eaf083e55898850634b6afe0ed82a0a2287d968ca8a422a5296c02a95e24
-
SSDEEP
12288:BMrvy90aIlS5z+Igau7b/d28uXxsA5OJsJg:Gysu+IRunFSXF5Xm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-