General
-
Target
ce095665dced55bcab2ef8ffd10fdf887ae3ca2f74217d15b7e43097cf4641df
-
Size
556KB
-
Sample
230302-3sgfjafd54
-
MD5
2548dd35ae0cb56cdd86742a61606bd2
-
SHA1
a42a247c7a29f082d8e854ae5f4f25dff79d8a95
-
SHA256
ce095665dced55bcab2ef8ffd10fdf887ae3ca2f74217d15b7e43097cf4641df
-
SHA512
7705ae0ea2f116461abfac475e0fc5da7943e57eee9329c19c299c6fda52f5b5c82e31887f84605e6fad2f30b4185ceeb969e2465a9c5ffb511a0717d627c0cd
-
SSDEEP
12288:JMrJy90PQDqQcL6iqo4btbQPp8BHRiWZoJefv6lbm:0yip9hqlbtbQRyHU3Je2bm
Static task
static1
Behavioral task
behavioral1
Sample
ce095665dced55bcab2ef8ffd10fdf887ae3ca2f74217d15b7e43097cf4641df.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Targets
-
-
Target
ce095665dced55bcab2ef8ffd10fdf887ae3ca2f74217d15b7e43097cf4641df
-
Size
556KB
-
MD5
2548dd35ae0cb56cdd86742a61606bd2
-
SHA1
a42a247c7a29f082d8e854ae5f4f25dff79d8a95
-
SHA256
ce095665dced55bcab2ef8ffd10fdf887ae3ca2f74217d15b7e43097cf4641df
-
SHA512
7705ae0ea2f116461abfac475e0fc5da7943e57eee9329c19c299c6fda52f5b5c82e31887f84605e6fad2f30b4185ceeb969e2465a9c5ffb511a0717d627c0cd
-
SSDEEP
12288:JMrJy90PQDqQcL6iqo4btbQPp8BHRiWZoJefv6lbm:0yip9hqlbtbQRyHU3Je2bm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-