General
-
Target
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3
-
Size
695KB
-
Sample
230303-bl3lmsff82
-
MD5
41e0491fd8419eece12787bc14a75ba9
-
SHA1
8835b1e6ef410094c52e56bcbf663ec652ddf87d
-
SHA256
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3
-
SHA512
3e5cdc90e18192ac06c52fe1bcca0aa849f1016635956c4a2bc776de4fe9a2c8929bea833b438a64bf37ad31825e4a12d5ed935d0768aa4364817ea643e01c94
-
SSDEEP
12288:cMrhy90sFIPK2IHL6/UIht34lZgHaS2nIYgPfmZmx2g+kNUqkjSIH0+gBLPXYOgx:9yTF6K2IHLg3hbHaSgIYgnmZmX+/XSIB
Static task
static1
Behavioral task
behavioral1
Sample
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Targets
-
-
Target
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3
-
Size
695KB
-
MD5
41e0491fd8419eece12787bc14a75ba9
-
SHA1
8835b1e6ef410094c52e56bcbf663ec652ddf87d
-
SHA256
6d2ed45115cc5837e9d08e8467634b556a77d0f30c147328b6b0d2f62fc934c3
-
SHA512
3e5cdc90e18192ac06c52fe1bcca0aa849f1016635956c4a2bc776de4fe9a2c8929bea833b438a64bf37ad31825e4a12d5ed935d0768aa4364817ea643e01c94
-
SSDEEP
12288:cMrhy90sFIPK2IHL6/UIht34lZgHaS2nIYgPfmZmx2g+kNUqkjSIH0+gBLPXYOgx:9yTF6K2IHLg3hbHaSgIYgnmZmX+/XSIB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-