General
-
Target
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793
-
Size
535KB
-
Sample
230301-hgdv2seh79
-
MD5
5bea591f7d715e3f1ef60f92cb8898d4
-
SHA1
f5d6010e0ef2c8915958d22cfebc3435581fae8e
-
SHA256
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793
-
SHA512
cc7de593bc23e43b0ca9184ad3b6024a3dc159ce10fa7682d5a6f57004668027dc9f2af73f3b5bc57401db5260854b31f999cfd064e97f78dde88b9a5f703fda
-
SSDEEP
12288:rMrry90WgdnUB4DzErO8dAh0mGhTS2Bodl/eGgHZr:wyjgnUCz4hTUlRgHZr
Static task
static1
Behavioral task
behavioral1
Sample
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793
-
Size
535KB
-
MD5
5bea591f7d715e3f1ef60f92cb8898d4
-
SHA1
f5d6010e0ef2c8915958d22cfebc3435581fae8e
-
SHA256
003eb019ceeb7a12857e25737af3012d18ca83453f024dbcae06695897147793
-
SHA512
cc7de593bc23e43b0ca9184ad3b6024a3dc159ce10fa7682d5a6f57004668027dc9f2af73f3b5bc57401db5260854b31f999cfd064e97f78dde88b9a5f703fda
-
SSDEEP
12288:rMrry90WgdnUB4DzErO8dAh0mGhTS2Bodl/eGgHZr:wyjgnUCz4hTUlRgHZr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-