General
-
Target
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580
-
Size
536KB
-
Sample
230301-xg69xshf64
-
MD5
cb365dc0e729bf457ea3f77af824bc7e
-
SHA1
ec538147b23a314f288ce6c3b477ef3588a0d10e
-
SHA256
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580
-
SHA512
fa04862a5d51a1c208bad1788b009f8958909f1fc03057cc2770f2e122d504e8de632db49f214392e314d1da287c5b67a00339080cf7d11de6b818937dd81208
-
SSDEEP
12288:EMray90nSALTqYkBgUu5q/kfjkoH9BNZt9fwxAD7Q5t:2yUfL+YKgUcfAxA4t
Static task
static1
Behavioral task
behavioral1
Sample
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580
-
Size
536KB
-
MD5
cb365dc0e729bf457ea3f77af824bc7e
-
SHA1
ec538147b23a314f288ce6c3b477ef3588a0d10e
-
SHA256
250f855a783446caf29f2e44b0c3e8227d4269073ef373563d6b0df940e4d580
-
SHA512
fa04862a5d51a1c208bad1788b009f8958909f1fc03057cc2770f2e122d504e8de632db49f214392e314d1da287c5b67a00339080cf7d11de6b818937dd81208
-
SSDEEP
12288:EMray90nSALTqYkBgUu5q/kfjkoH9BNZt9fwxAD7Q5t:2yUfL+YKgUcfAxA4t
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-