General
-
Target
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0
-
Size
536KB
-
Sample
230301-jyc6hsfc83
-
MD5
13ce7fd7f946e0baa3fc2407b40b342e
-
SHA1
226feff35d0ecce14041f1f03fa862f72307e24b
-
SHA256
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0
-
SHA512
66fc38e1414b934ac51cb7dbf59affdbacb0c079b7a829af6719bdea8e541288cbb7d038d595a37f812f29e017ac449fe117139dc355c8e8d0f25f4e3af3e157
-
SSDEEP
12288:QMruy90qv2On7/nSLbzIAL4kjenhJ2llUYKxxYY/o1xcUm1B+l:uyn77/SH8AxwhI0YYyYg1xcUQEl
Static task
static1
Behavioral task
behavioral1
Sample
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0
-
Size
536KB
-
MD5
13ce7fd7f946e0baa3fc2407b40b342e
-
SHA1
226feff35d0ecce14041f1f03fa862f72307e24b
-
SHA256
99b58a3eeac4d2477dbb27e53426664163ec651365965c44e95b65955a9b69c0
-
SHA512
66fc38e1414b934ac51cb7dbf59affdbacb0c079b7a829af6719bdea8e541288cbb7d038d595a37f812f29e017ac449fe117139dc355c8e8d0f25f4e3af3e157
-
SSDEEP
12288:QMruy90qv2On7/nSLbzIAL4kjenhJ2llUYKxxYY/o1xcUm1B+l:uyn77/SH8AxwhI0YYyYg1xcUQEl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-