General
-
Target
86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936
-
Size
1.2MB
-
Sample
230301-mfeheafc8s
-
MD5
e3cc26daaa71d3815fcf00b364daf2eb
-
SHA1
f7e9025a0eb119cd583e7cf03dad0e02f6432d96
-
SHA256
86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936
-
SHA512
fcb45ae85aef1fb83a50f92e9977080d48c7f70187a18272608d91c7462d42bb600a07836c2bf4cdc15e17f3239684f5f336d14013a1091bebfac6b4c76a7205
-
SSDEEP
24576:GyfAIGD8AMMOx/HQR42eMpZty49nXXj8U//zm1Kr/rJ1D:VfV88lRwre6ZAmXXj8DKr/rJ
Static task
static1
Behavioral task
behavioral1
Sample
86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
dunkan
193.233.20.24:4123
-
auth_value
505c396c57c6287fc3fdc5f3aeab0819
Targets
-
-
Target
86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936
-
Size
1.2MB
-
MD5
e3cc26daaa71d3815fcf00b364daf2eb
-
SHA1
f7e9025a0eb119cd583e7cf03dad0e02f6432d96
-
SHA256
86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936
-
SHA512
fcb45ae85aef1fb83a50f92e9977080d48c7f70187a18272608d91c7462d42bb600a07836c2bf4cdc15e17f3239684f5f336d14013a1091bebfac6b4c76a7205
-
SSDEEP
24576:GyfAIGD8AMMOx/HQR42eMpZty49nXXj8U//zm1Kr/rJ1D:VfV88lRwre6ZAmXXj8DKr/rJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-