General
-
Target
013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c
-
Size
1.1MB
-
Sample
230301-qcpqragc49
-
MD5
eff0ef4b378f6f520e598ebe89610943
-
SHA1
30a80ed6b016191de30a1790dc610a2f6007ae7f
-
SHA256
013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c
-
SHA512
b678d37d0999d00f20344446160cab6506fa26f71ab2f9a710ac956102952610dd8e05cc075cb68f7fe2d436badb5545f120024c9be2d44dc66a5f1e417b291a
-
SSDEEP
24576:9ywq0fDRAE0Wxii7QYZ0d24/RKJfNoRLR/LSPtHGUIEzJcN:Ywq07Rp0WxZQYZ0d3RK9NoRdcZIEzJc
Static task
static1
Behavioral task
behavioral1
Sample
013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
dunkan
193.233.20.24:4123
-
auth_value
505c396c57c6287fc3fdc5f3aeab0819
Targets
-
-
Target
013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c
-
Size
1.1MB
-
MD5
eff0ef4b378f6f520e598ebe89610943
-
SHA1
30a80ed6b016191de30a1790dc610a2f6007ae7f
-
SHA256
013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c
-
SHA512
b678d37d0999d00f20344446160cab6506fa26f71ab2f9a710ac956102952610dd8e05cc075cb68f7fe2d436badb5545f120024c9be2d44dc66a5f1e417b291a
-
SSDEEP
24576:9ywq0fDRAE0Wxii7QYZ0d24/RKJfNoRLR/LSPtHGUIEzJcN:Ywq07Rp0WxZQYZ0d3RK9NoRdcZIEzJc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-