General
-
Target
8234f55745a5f5bafd006fbf96156138890d87492d29f8a76a49931aa667ec73
-
Size
1.2MB
-
Sample
230301-cmz3ksdg6z
-
MD5
167e5b9143136a8d01782c5de939d3b9
-
SHA1
1f19e64c89bcb698647fb4480cbe6543f249a106
-
SHA256
8234f55745a5f5bafd006fbf96156138890d87492d29f8a76a49931aa667ec73
-
SHA512
ecef7cfa5e56a609e57b926dd342c2d49e4bc70919658f8378301d31f43b086aa6420e1103bd0f2fc796e9f39c9dc279d769b90cd26e29598712af493a97d8e7
-
SSDEEP
24576:yyQ0cnLedfvxclTAhdTCRf7FkeD3JVZFoqt9yg9:ZQxLWfvmlkiVFkeD3NLyg
Static task
static1
Behavioral task
behavioral1
Sample
8234f55745a5f5bafd006fbf96156138890d87492d29f8a76a49931aa667ec73.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
dunkan
193.233.20.24:4123
-
auth_value
505c396c57c6287fc3fdc5f3aeab0819
Targets
-
-
Target
8234f55745a5f5bafd006fbf96156138890d87492d29f8a76a49931aa667ec73
-
Size
1.2MB
-
MD5
167e5b9143136a8d01782c5de939d3b9
-
SHA1
1f19e64c89bcb698647fb4480cbe6543f249a106
-
SHA256
8234f55745a5f5bafd006fbf96156138890d87492d29f8a76a49931aa667ec73
-
SHA512
ecef7cfa5e56a609e57b926dd342c2d49e4bc70919658f8378301d31f43b086aa6420e1103bd0f2fc796e9f39c9dc279d769b90cd26e29598712af493a97d8e7
-
SSDEEP
24576:yyQ0cnLedfvxclTAhdTCRf7FkeD3JVZFoqt9yg9:ZQxLWfvmlkiVFkeD3NLyg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-