General
-
Target
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a
-
Size
556KB
-
Sample
230303-dtzwtsga55
-
MD5
fd55f7f1b7dfc93135db9996553bae72
-
SHA1
55073f8da85edd8326201a97a796d65ad5d8a107
-
SHA256
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a
-
SHA512
cd5964f1e2331ed2b2bdadb40292e7a20c78d92cd998ba8bb7058c0d88f51ddf467cb03e8d649dbe67d9f51d7392f9d6ff321dcd9a2c9ffb2f342a521bcee748
-
SSDEEP
12288:jMrby90K0nXWoP+4nmA/IDch5K8S4In0E56grmeJ+wEnkbpVA:Iyb0nXT1r7I95drmeJHEnkbpVA
Static task
static1
Behavioral task
behavioral1
Sample
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Targets
-
-
Target
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a
-
Size
556KB
-
MD5
fd55f7f1b7dfc93135db9996553bae72
-
SHA1
55073f8da85edd8326201a97a796d65ad5d8a107
-
SHA256
bbb12f757d1635cdcba621ef2a153d57480c4042f02c7c0379c757fab828f31a
-
SHA512
cd5964f1e2331ed2b2bdadb40292e7a20c78d92cd998ba8bb7058c0d88f51ddf467cb03e8d649dbe67d9f51d7392f9d6ff321dcd9a2c9ffb2f342a521bcee748
-
SSDEEP
12288:jMrby90K0nXWoP+4nmA/IDch5K8S4In0E56grmeJ+wEnkbpVA:Iyb0nXT1r7I95drmeJHEnkbpVA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-