General
-
Target
5cb9f1813c4fdf0ad413b98d84804ceaea26a64db1d38e75f2abe7fec1f90265
-
Size
1.2MB
-
Sample
230302-jac6lsbh57
-
MD5
bdf0c7395a7f776512f56600b8a29b54
-
SHA1
4ef071e6df329325965303afbde4e4df8ea80f6c
-
SHA256
5cb9f1813c4fdf0ad413b98d84804ceaea26a64db1d38e75f2abe7fec1f90265
-
SHA512
374ee6d4758b1b03b46435994ad9652d51cc369a80c232a5b1a7173e9b80b0dfa6ecc3677d22590e78e6ccdfd3171302a3ac32b9f18d374a48edc29e2dbd590e
-
SSDEEP
24576:Fyr/y1y/WdApn5Ir8ctS2dNMPlWLGGYE87jpzWrfX8Y/R5c6UBzhJ:grwyyKqrY2dalWLuBpYrM64z
Static task
static1
Behavioral task
behavioral1
Sample
5cb9f1813c4fdf0ad413b98d84804ceaea26a64db1d38e75f2abe7fec1f90265.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
durov
193.56.146.11:4162
-
auth_value
337984645d237df105d30aab7013119f
Targets
-
-
Target
5cb9f1813c4fdf0ad413b98d84804ceaea26a64db1d38e75f2abe7fec1f90265
-
Size
1.2MB
-
MD5
bdf0c7395a7f776512f56600b8a29b54
-
SHA1
4ef071e6df329325965303afbde4e4df8ea80f6c
-
SHA256
5cb9f1813c4fdf0ad413b98d84804ceaea26a64db1d38e75f2abe7fec1f90265
-
SHA512
374ee6d4758b1b03b46435994ad9652d51cc369a80c232a5b1a7173e9b80b0dfa6ecc3677d22590e78e6ccdfd3171302a3ac32b9f18d374a48edc29e2dbd590e
-
SSDEEP
24576:Fyr/y1y/WdApn5Ir8ctS2dNMPlWLGGYE87jpzWrfX8Y/R5c6UBzhJ:grwyyKqrY2dalWLuBpYrM64z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-