General
-
Target
3b915dc9042854fb0b742820a3a1cba6af5447132511935e6bc7799ccf3bb318
-
Size
536KB
-
Sample
230301-pdzfxagb33
-
MD5
96bdd3323c89b59ff199c25085f99549
-
SHA1
1314096a3094180911ef056b7eeedc9e4fc0b787
-
SHA256
3b915dc9042854fb0b742820a3a1cba6af5447132511935e6bc7799ccf3bb318
-
SHA512
e8b4d422fe1e7b0af371c2ca8729589dd9dde85e2bf1dbff61a3e6ae4ed357294b2dced95fc7896bd649394d3d05e92b44a0a0137c6c1a86c8288e809178b930
-
SSDEEP
12288:0Mroy90u/tJJylFtjqPZFyuKy84td5rxZTJnbH:EyZFTylFJSzyDyRb5rbJbH
Static task
static1
Behavioral task
behavioral1
Sample
3b915dc9042854fb0b742820a3a1cba6af5447132511935e6bc7799ccf3bb318.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
3b915dc9042854fb0b742820a3a1cba6af5447132511935e6bc7799ccf3bb318
-
Size
536KB
-
MD5
96bdd3323c89b59ff199c25085f99549
-
SHA1
1314096a3094180911ef056b7eeedc9e4fc0b787
-
SHA256
3b915dc9042854fb0b742820a3a1cba6af5447132511935e6bc7799ccf3bb318
-
SHA512
e8b4d422fe1e7b0af371c2ca8729589dd9dde85e2bf1dbff61a3e6ae4ed357294b2dced95fc7896bd649394d3d05e92b44a0a0137c6c1a86c8288e809178b930
-
SSDEEP
12288:0Mroy90u/tJJylFtjqPZFyuKy84td5rxZTJnbH:EyZFTylFJSzyDyRb5rbJbH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-