General
-
Target
f53a00a4fc816ede72ddd1b4724bc3d8073f317f33cca3c7098284e44996a20e
-
Size
536KB
-
Sample
230301-es8b9aeb5s
-
MD5
90375b1ecac6801911575f00c5ebfd99
-
SHA1
aa291c0773df4bfddc344e1a8368d803c8c0dc27
-
SHA256
f53a00a4fc816ede72ddd1b4724bc3d8073f317f33cca3c7098284e44996a20e
-
SHA512
131da0569e3bdc280fc367a26dc3deb6e7e0191956a9565ef1656dfdceb39e799a4d07f2ed01d284646a4af59f47e11b4c9b2877f249e0d17231690169138264
-
SSDEEP
12288:gMrMy90iO0ujzVSTnkDbu+y2vHoPyN6LlNZpfu1l:8yrURSebu+fvIPXZpWH
Static task
static1
Behavioral task
behavioral1
Sample
f53a00a4fc816ede72ddd1b4724bc3d8073f317f33cca3c7098284e44996a20e.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
f53a00a4fc816ede72ddd1b4724bc3d8073f317f33cca3c7098284e44996a20e
-
Size
536KB
-
MD5
90375b1ecac6801911575f00c5ebfd99
-
SHA1
aa291c0773df4bfddc344e1a8368d803c8c0dc27
-
SHA256
f53a00a4fc816ede72ddd1b4724bc3d8073f317f33cca3c7098284e44996a20e
-
SHA512
131da0569e3bdc280fc367a26dc3deb6e7e0191956a9565ef1656dfdceb39e799a4d07f2ed01d284646a4af59f47e11b4c9b2877f249e0d17231690169138264
-
SSDEEP
12288:gMrMy90iO0ujzVSTnkDbu+y2vHoPyN6LlNZpfu1l:8yrURSebu+fvIPXZpWH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-