General
-
Target
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9
-
Size
555KB
-
Sample
230303-baeqfaff34
-
MD5
1e0d7aa55637fca15632ff7c65537ea6
-
SHA1
6506b86bb033eee5982f0778a79886dbfbe09e58
-
SHA256
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9
-
SHA512
208045a6ef5106f0184179fa7d4e83c46a4524db2ef91f17d8149a6a361a6c4d209210b8361df8e93dbe8d40f1f49087ec7a8d1fac10030345538fc1402e1005
-
SSDEEP
12288:XMrUy901rHw/QWC4WcUfDUZfaTx2aAi3g+INM8rsYlDvxTQFlAlKWVtR:LyCrQYSWcIsCT4aAj+x8rVD5sF2lKir
Static task
static1
Behavioral task
behavioral1
Sample
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Targets
-
-
Target
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9
-
Size
555KB
-
MD5
1e0d7aa55637fca15632ff7c65537ea6
-
SHA1
6506b86bb033eee5982f0778a79886dbfbe09e58
-
SHA256
54754c2080fd2e99f408fbe9c329ed5d73da1a64089eef013ff54f209cd4d8a9
-
SHA512
208045a6ef5106f0184179fa7d4e83c46a4524db2ef91f17d8149a6a361a6c4d209210b8361df8e93dbe8d40f1f49087ec7a8d1fac10030345538fc1402e1005
-
SSDEEP
12288:XMrUy901rHw/QWC4WcUfDUZfaTx2aAi3g+INM8rsYlDvxTQFlAlKWVtR:LyCrQYSWcIsCT4aAj+x8rVD5sF2lKir
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-