General
-
Target
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
Size
666KB
-
Sample
230303-gnzknagd57
-
MD5
0c9778e3bd70c313dd3277be818477ae
-
SHA1
6c25fe888c18f27f67453603dc650dc93f00e499
-
SHA256
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
SHA512
09781bd5bf7aac6de5e678a2941f989fb38f4a32f2d5c4e5db81adb20c9f38840740dd9f13390ef654b4f73ec547ec70c3cd4006d7903e31ef08b0c5077768c1
-
SSDEEP
12288:3MrEy90Cq0QSSfm5BdFFwhCXdGI5k4H4oPrmR3X6NzP/B374PISYd+8:ry6Bm5Bn+hodGI53PK3wbB374H8
Static task
static1
Behavioral task
behavioral1
Sample
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Targets
-
-
Target
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
Size
666KB
-
MD5
0c9778e3bd70c313dd3277be818477ae
-
SHA1
6c25fe888c18f27f67453603dc650dc93f00e499
-
SHA256
4f7f5e4b9460602d13adffc6c320f0c72958cbf67043c8ab1b7a86819bc8c55c
-
SHA512
09781bd5bf7aac6de5e678a2941f989fb38f4a32f2d5c4e5db81adb20c9f38840740dd9f13390ef654b4f73ec547ec70c3cd4006d7903e31ef08b0c5077768c1
-
SSDEEP
12288:3MrEy90Cq0QSSfm5BdFFwhCXdGI5k4H4oPrmR3X6NzP/B374PISYd+8:ry6Bm5Bn+hodGI53PK3wbB374H8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-