General
-
Target
270092c8b3bcc3f91bea0fbf1d5775d0482d0647feaec76b558b783e0efe63b3
-
Size
536KB
-
Sample
230301-wa6jdahd26
-
MD5
f80f52094a3d6b89898f098db8453b33
-
SHA1
f73868f97404556ee41077b4ab6f7aac0c7a0ac1
-
SHA256
270092c8b3bcc3f91bea0fbf1d5775d0482d0647feaec76b558b783e0efe63b3
-
SHA512
adfc6a81ee00fe03fbe50c7a6e093d7645a774c4d0d43aff05242bd5a5738c9fdc2d8cf07ecb1f424119919e1e8d32886b20ed845f4978820a0ed0eddc8c91fc
-
SSDEEP
12288:uMrBy90Bz0AxVYMCubRHEKecrBNKg9b99hQm/xHE:byiz3jYM9PBBNKeVBa
Static task
static1
Behavioral task
behavioral1
Sample
270092c8b3bcc3f91bea0fbf1d5775d0482d0647feaec76b558b783e0efe63b3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
270092c8b3bcc3f91bea0fbf1d5775d0482d0647feaec76b558b783e0efe63b3
-
Size
536KB
-
MD5
f80f52094a3d6b89898f098db8453b33
-
SHA1
f73868f97404556ee41077b4ab6f7aac0c7a0ac1
-
SHA256
270092c8b3bcc3f91bea0fbf1d5775d0482d0647feaec76b558b783e0efe63b3
-
SHA512
adfc6a81ee00fe03fbe50c7a6e093d7645a774c4d0d43aff05242bd5a5738c9fdc2d8cf07ecb1f424119919e1e8d32886b20ed845f4978820a0ed0eddc8c91fc
-
SSDEEP
12288:uMrBy90Bz0AxVYMCubRHEKecrBNKg9b99hQm/xHE:byiz3jYM9PBBNKeVBa
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-