General
-
Target
004220c269d769a8c8ca6e99ed4a7d0a4f6f1eb48ae0482c984d47124777d593
-
Size
547KB
-
Sample
230301-c1ry5adg9w
-
MD5
5207c77d4bf38bf4e347e9a747a0df96
-
SHA1
51585ad1694b45ee915f388c458986a5e67ad1e4
-
SHA256
004220c269d769a8c8ca6e99ed4a7d0a4f6f1eb48ae0482c984d47124777d593
-
SHA512
40f1171024abfe7cd4fc39c605153821adb967aa9de424caad18a7daef740ab6a132604acbefbf109bc63a8196fe406b29bcfb865ce5ed78f68343e46da69536
-
SSDEEP
12288:LMrry90XtvLviZD9wUAoyQA1kQgHcG/vUMCxS70sZB6teYn58bO:MyANLvZUbxCgHRUviRubnGC
Static task
static1
Behavioral task
behavioral1
Sample
004220c269d769a8c8ca6e99ed4a7d0a4f6f1eb48ae0482c984d47124777d593.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
004220c269d769a8c8ca6e99ed4a7d0a4f6f1eb48ae0482c984d47124777d593
-
Size
547KB
-
MD5
5207c77d4bf38bf4e347e9a747a0df96
-
SHA1
51585ad1694b45ee915f388c458986a5e67ad1e4
-
SHA256
004220c269d769a8c8ca6e99ed4a7d0a4f6f1eb48ae0482c984d47124777d593
-
SHA512
40f1171024abfe7cd4fc39c605153821adb967aa9de424caad18a7daef740ab6a132604acbefbf109bc63a8196fe406b29bcfb865ce5ed78f68343e46da69536
-
SSDEEP
12288:LMrry90XtvLviZD9wUAoyQA1kQgHcG/vUMCxS70sZB6teYn58bO:MyANLvZUbxCgHRUviRubnGC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-