General
-
Target
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4
-
Size
544KB
-
Sample
230302-vaym4add7t
-
MD5
d1ce70d9fd7231cff5eeb46e88baaafc
-
SHA1
39e95b84e2f54eb52a95425eae7ca8154441868b
-
SHA256
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4
-
SHA512
afadb88041f1b2287c6878db9cd8f80ecdcd93df4d0adc74172ddb0c930cc1da26539161e4a74d88e6e01f4bd7f402e45dc3d15da017161ab19493de82dd3dfb
-
SSDEEP
12288:JMrNy904G9Ia7HdRHAZjDabTud9uUsshR7n0KtUQBq8Gwpx:cyBBa7H/iDiTuDAsb02XGCx
Static task
static1
Behavioral task
behavioral1
Sample
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4
-
Size
544KB
-
MD5
d1ce70d9fd7231cff5eeb46e88baaafc
-
SHA1
39e95b84e2f54eb52a95425eae7ca8154441868b
-
SHA256
24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4
-
SHA512
afadb88041f1b2287c6878db9cd8f80ecdcd93df4d0adc74172ddb0c930cc1da26539161e4a74d88e6e01f4bd7f402e45dc3d15da017161ab19493de82dd3dfb
-
SSDEEP
12288:JMrNy904G9Ia7HdRHAZjDabTud9uUsshR7n0KtUQBq8Gwpx:cyBBa7H/iDiTuDAsb02XGCx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-