General
-
Target
671b9647376820854de48209779d51d7f803d838237d5288560651c535a5d54e
-
Size
548KB
-
Sample
230301-ccwmeaeb42
-
MD5
8fcc4f047c59b4f8139ae5af5c935979
-
SHA1
9bfedf24f815401a127d67193b58317b466c4164
-
SHA256
671b9647376820854de48209779d51d7f803d838237d5288560651c535a5d54e
-
SHA512
0f123ddd40bf132ed266a5bb73f6595414f202db2be80fd31ab791c6900684ec82c7abec7e8940ad3245f22c958de6a506775afe21a24d03bbaeac74a1e187c2
-
SSDEEP
12288:fMrKy90QZVMzPZWJSD8iVfNnmXLwFfF/U64Ljnyj3l:ty9VgZuSD3m7wJvqjnyj1
Static task
static1
Behavioral task
behavioral1
Sample
671b9647376820854de48209779d51d7f803d838237d5288560651c535a5d54e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
671b9647376820854de48209779d51d7f803d838237d5288560651c535a5d54e
-
Size
548KB
-
MD5
8fcc4f047c59b4f8139ae5af5c935979
-
SHA1
9bfedf24f815401a127d67193b58317b466c4164
-
SHA256
671b9647376820854de48209779d51d7f803d838237d5288560651c535a5d54e
-
SHA512
0f123ddd40bf132ed266a5bb73f6595414f202db2be80fd31ab791c6900684ec82c7abec7e8940ad3245f22c958de6a506775afe21a24d03bbaeac74a1e187c2
-
SSDEEP
12288:fMrKy90QZVMzPZWJSD8iVfNnmXLwFfF/U64Ljnyj3l:ty9VgZuSD3m7wJvqjnyj1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-