General
-
Target
d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2
-
Size
666KB
-
Sample
230303-hxszxage59
-
MD5
a0e4036d230c140dfbac3ed770d81063
-
SHA1
7376cda3fe96c47a7183430ecc46cbe087b80c3d
-
SHA256
d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2
-
SHA512
fd48d46ec852dd1dc57ad74da7844e1ca1b06326396132bf199a3a7feb53c24a38a987b3926bf9e5ea18c189ffad91f71ba851afdfe08a1b8ff26441a5e53457
-
SSDEEP
12288:wMrmy90hwPxwBsiKAVKJNSRtCzXdGM5k4QZorHmR3X6NnPTB3WtPISYdAghnMmm:GyLwBsipkJCtudGM5vr23wLB3WtZghLm
Static task
static1
Behavioral task
behavioral1
Sample
d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Targets
-
-
Target
d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2
-
Size
666KB
-
MD5
a0e4036d230c140dfbac3ed770d81063
-
SHA1
7376cda3fe96c47a7183430ecc46cbe087b80c3d
-
SHA256
d56fa41dc47134241c4cd8c8316af2fe1c3fe24149725ad4558daeed4452d5a2
-
SHA512
fd48d46ec852dd1dc57ad74da7844e1ca1b06326396132bf199a3a7feb53c24a38a987b3926bf9e5ea18c189ffad91f71ba851afdfe08a1b8ff26441a5e53457
-
SSDEEP
12288:wMrmy90hwPxwBsiKAVKJNSRtCzXdGM5k4QZorHmR3X6NnPTB3WtPISYdAghnMmm:GyLwBsipkJCtudGM5vr23wLB3WtZghLm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-