General
-
Target
6c3d62487f45f3d30012cacb802a194121935b15b13866092c88cc9b646abb38
-
Size
666KB
-
Sample
230303-hrns1age49
-
MD5
2af022b2c188b2f04569df13c2acd3a0
-
SHA1
09305ecadb10019e7b82c508427d90f04b5472f4
-
SHA256
6c3d62487f45f3d30012cacb802a194121935b15b13866092c88cc9b646abb38
-
SHA512
a893c0884bf0305bc6c8307085e3f808235ce87b43a171aaca0d24d407e8d8b9f23291cb1927a63dae8e653cea425a77db7ddb7d4e8bd18fa9e5aee49b8851fc
-
SSDEEP
12288:lMrCy90/v+0pVS3RYugnFZa77XdGs5k4Zr1mR3X6NZP9B3JePISYdSI6:bye2gV1LWLdGs5xrM3wjB3Jev
Static task
static1
Behavioral task
behavioral1
Sample
6c3d62487f45f3d30012cacb802a194121935b15b13866092c88cc9b646abb38.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Targets
-
-
Target
6c3d62487f45f3d30012cacb802a194121935b15b13866092c88cc9b646abb38
-
Size
666KB
-
MD5
2af022b2c188b2f04569df13c2acd3a0
-
SHA1
09305ecadb10019e7b82c508427d90f04b5472f4
-
SHA256
6c3d62487f45f3d30012cacb802a194121935b15b13866092c88cc9b646abb38
-
SHA512
a893c0884bf0305bc6c8307085e3f808235ce87b43a171aaca0d24d407e8d8b9f23291cb1927a63dae8e653cea425a77db7ddb7d4e8bd18fa9e5aee49b8851fc
-
SSDEEP
12288:lMrCy90/v+0pVS3RYugnFZa77XdGs5k4Zr1mR3X6NZP9B3JePISYdSI6:bye2gV1LWLdGs5xrM3wjB3Jev
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-