General
-
Target
d12ed8b3ad6b36ec254becc45e4a394ef154d67d6ed33320728b9f4bff61c807
-
Size
1.2MB
-
Sample
230301-j53prafd25
-
MD5
ce88aa27dd777be5b52505c5daf4ccf3
-
SHA1
f85b483121e3ddfbfd71927a72d667c7405c7869
-
SHA256
d12ed8b3ad6b36ec254becc45e4a394ef154d67d6ed33320728b9f4bff61c807
-
SHA512
602d80eb1c839ca77094a1386ec60dfcd1bdf0c9eae85a078aeec4d6509bfdf7eee280d951586565bfd687970091068d7a94dca988bb4a763d5c253ed32ffe01
-
SSDEEP
24576:Rygly1MjRtTfkagXS7/qpF3YAOw3C2vDab3oO83SdRhp5s2aKzk:Egl8CRtT8z6ipF3YAOw3Ck2b3or3URhH
Static task
static1
Behavioral task
behavioral1
Sample
d12ed8b3ad6b36ec254becc45e4a394ef154d67d6ed33320728b9f4bff61c807.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
dunkan
193.233.20.24:4123
-
auth_value
505c396c57c6287fc3fdc5f3aeab0819
Targets
-
-
Target
d12ed8b3ad6b36ec254becc45e4a394ef154d67d6ed33320728b9f4bff61c807
-
Size
1.2MB
-
MD5
ce88aa27dd777be5b52505c5daf4ccf3
-
SHA1
f85b483121e3ddfbfd71927a72d667c7405c7869
-
SHA256
d12ed8b3ad6b36ec254becc45e4a394ef154d67d6ed33320728b9f4bff61c807
-
SHA512
602d80eb1c839ca77094a1386ec60dfcd1bdf0c9eae85a078aeec4d6509bfdf7eee280d951586565bfd687970091068d7a94dca988bb4a763d5c253ed32ffe01
-
SSDEEP
24576:Rygly1MjRtTfkagXS7/qpF3YAOw3C2vDab3oO83SdRhp5s2aKzk:Egl8CRtT8z6ipF3YAOw3Ck2b3or3URhH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-