General
-
Target
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0
-
Size
548KB
-
Sample
230302-k8l2vabh6x
-
MD5
e3e7dda40dc6e1cdd5e36d6e434ef358
-
SHA1
d321a5afa268791ff2be9bd3ed602cb597ef5384
-
SHA256
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0
-
SHA512
38599c41beae6d658e35074152b865a9d058d163b4008bcb183fe1c8fcc0b19f462cfd8f9ff2d14078feba92e33e4647be8f76c180979f37900124441baecfbb
-
SSDEEP
12288:iMrSy90IyJRBxjvB4DrnSyS74cG7M/1Jjs13gxjEw:4ypynBxjZszhSTGqJi3En
Static task
static1
Behavioral task
behavioral1
Sample
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0
-
Size
548KB
-
MD5
e3e7dda40dc6e1cdd5e36d6e434ef358
-
SHA1
d321a5afa268791ff2be9bd3ed602cb597ef5384
-
SHA256
18dd85fb365b907bfd913272da3ef0f2bfd2131ff1142adbe99b3f75783b49d0
-
SHA512
38599c41beae6d658e35074152b865a9d058d163b4008bcb183fe1c8fcc0b19f462cfd8f9ff2d14078feba92e33e4647be8f76c180979f37900124441baecfbb
-
SSDEEP
12288:iMrSy90IyJRBxjvB4DrnSyS74cG7M/1Jjs13gxjEw:4ypynBxjZszhSTGqJi3En
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-