General
-
Target
8f819fc88d4d74afdf836beaa14368c37bc962800e08d3112225da8f2dbe6f6e
-
Size
551KB
-
Sample
230302-hse79abd9t
-
MD5
b2372b48e4bbb5c46e15d167f658f009
-
SHA1
292dbb47bf8a60e3d589ff66f4ad35e370997938
-
SHA256
8f819fc88d4d74afdf836beaa14368c37bc962800e08d3112225da8f2dbe6f6e
-
SHA512
07ecc1041dc720fa0907be2f8d2d416b28a1678e6b6dc8ebfeb90b45287e78a7a2adb124acba015d3dc5deda3c3a6daf24512d60e5cc847b04104cba16ef51e0
-
SSDEEP
12288:rMr0y90bgGGpB407oTfDVJgmRbG3jU24dbE+aneCiMqwA5ak1:/y3GEZcXZk4dQ+yY0y
Static task
static1
Behavioral task
behavioral1
Sample
8f819fc88d4d74afdf836beaa14368c37bc962800e08d3112225da8f2dbe6f6e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
8f819fc88d4d74afdf836beaa14368c37bc962800e08d3112225da8f2dbe6f6e
-
Size
551KB
-
MD5
b2372b48e4bbb5c46e15d167f658f009
-
SHA1
292dbb47bf8a60e3d589ff66f4ad35e370997938
-
SHA256
8f819fc88d4d74afdf836beaa14368c37bc962800e08d3112225da8f2dbe6f6e
-
SHA512
07ecc1041dc720fa0907be2f8d2d416b28a1678e6b6dc8ebfeb90b45287e78a7a2adb124acba015d3dc5deda3c3a6daf24512d60e5cc847b04104cba16ef51e0
-
SSDEEP
12288:rMr0y90bgGGpB407oTfDVJgmRbG3jU24dbE+aneCiMqwA5ak1:/y3GEZcXZk4dQ+yY0y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-