General
-
Target
ade04e25d5d485eacfd9c50d7443e7916d52a827b3edb6d148627514c74c2fc2
-
Size
536KB
-
Sample
230301-f93nrseg57
-
MD5
013deebde60660c79afbd376647fd701
-
SHA1
53f6add0272187b0154e473d38c1d49e6addf18e
-
SHA256
ade04e25d5d485eacfd9c50d7443e7916d52a827b3edb6d148627514c74c2fc2
-
SHA512
a1d3a7eea0a22c90827dc52f99da9a0318136e5104c7429ba3536bc248b9fc0e45bd158863623e9a12543bdd5fd1454d2a343642e5ef98a28d3bd3d32911e487
-
SSDEEP
12288:kMrUy90XHGi0CoP8tRLPqG1ZO6plNNFQ4jxBv:wy0Hx0CoP8DLHG4jbv
Static task
static1
Behavioral task
behavioral1
Sample
ade04e25d5d485eacfd9c50d7443e7916d52a827b3edb6d148627514c74c2fc2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
ade04e25d5d485eacfd9c50d7443e7916d52a827b3edb6d148627514c74c2fc2
-
Size
536KB
-
MD5
013deebde60660c79afbd376647fd701
-
SHA1
53f6add0272187b0154e473d38c1d49e6addf18e
-
SHA256
ade04e25d5d485eacfd9c50d7443e7916d52a827b3edb6d148627514c74c2fc2
-
SHA512
a1d3a7eea0a22c90827dc52f99da9a0318136e5104c7429ba3536bc248b9fc0e45bd158863623e9a12543bdd5fd1454d2a343642e5ef98a28d3bd3d32911e487
-
SSDEEP
12288:kMrUy90XHGi0CoP8tRLPqG1ZO6plNNFQ4jxBv:wy0Hx0CoP8DLHG4jbv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-