General
-
Target
f2f073684a73d21a04a16ade6a2dca48f78929b7d30513bb1612029cbf1adf06
-
Size
536KB
-
Sample
230302-a98l5aad8z
-
MD5
20f2c45e6d93aefd7d0ecf25a2b8b2e7
-
SHA1
4b9a53d9af607df9e0971387b0b4ebe110a0da88
-
SHA256
f2f073684a73d21a04a16ade6a2dca48f78929b7d30513bb1612029cbf1adf06
-
SHA512
92edc9797bed721d01b4e3ebc432c00a8180f03d768dde038a6ec5804d7ae614a031e4afb3a8bdab9021da1f6fce3170a9820aa741b1244397096fdd9df6284c
-
SSDEEP
12288:wMr5y904if04/ae81HlktMWtiY4G9Jflvpj:ZyNK0qIHl2MWcY4G99j
Static task
static1
Behavioral task
behavioral1
Sample
f2f073684a73d21a04a16ade6a2dca48f78929b7d30513bb1612029cbf1adf06.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
f2f073684a73d21a04a16ade6a2dca48f78929b7d30513bb1612029cbf1adf06
-
Size
536KB
-
MD5
20f2c45e6d93aefd7d0ecf25a2b8b2e7
-
SHA1
4b9a53d9af607df9e0971387b0b4ebe110a0da88
-
SHA256
f2f073684a73d21a04a16ade6a2dca48f78929b7d30513bb1612029cbf1adf06
-
SHA512
92edc9797bed721d01b4e3ebc432c00a8180f03d768dde038a6ec5804d7ae614a031e4afb3a8bdab9021da1f6fce3170a9820aa741b1244397096fdd9df6284c
-
SSDEEP
12288:wMr5y904if04/ae81HlktMWtiY4G9Jflvpj:ZyNK0qIHl2MWcY4G99j
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-