General
-
Target
bff518604ba09e5c4d27884ced754480fa599a28edc4586a4379a0ec154796c2
-
Size
1.1MB
-
Sample
230302-h1b6kabh25
-
MD5
9d66b5c37c226bb7b0c8501c677c3fb2
-
SHA1
5c9e4a4d8931c9fe0983154cbf723cbf4444ba3b
-
SHA256
bff518604ba09e5c4d27884ced754480fa599a28edc4586a4379a0ec154796c2
-
SHA512
af1414bbb2ac87ebc709d2104f660921e841fa5c81294878bf89675ed888e55a8bc26402513247017ecd10c1265715d7fe2dd0eed659b73c25166ff6cd60c674
-
SSDEEP
24576:XyuNOaLNfqKBL4tR3QiZVp+E43XpRueN+HQ:iuEaLtnpERJVp+EYXp7EH
Static task
static1
Behavioral task
behavioral1
Sample
bff518604ba09e5c4d27884ced754480fa599a28edc4586a4379a0ec154796c2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
durov
193.56.146.11:4162
-
auth_value
337984645d237df105d30aab7013119f
Targets
-
-
Target
bff518604ba09e5c4d27884ced754480fa599a28edc4586a4379a0ec154796c2
-
Size
1.1MB
-
MD5
9d66b5c37c226bb7b0c8501c677c3fb2
-
SHA1
5c9e4a4d8931c9fe0983154cbf723cbf4444ba3b
-
SHA256
bff518604ba09e5c4d27884ced754480fa599a28edc4586a4379a0ec154796c2
-
SHA512
af1414bbb2ac87ebc709d2104f660921e841fa5c81294878bf89675ed888e55a8bc26402513247017ecd10c1265715d7fe2dd0eed659b73c25166ff6cd60c674
-
SSDEEP
24576:XyuNOaLNfqKBL4tR3QiZVp+E43XpRueN+HQ:iuEaLtnpERJVp+EYXp7EH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-