General
-
Target
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed
-
Size
526KB
-
Sample
230305-1p3hgshf22
-
MD5
b1d8c55cdb5168fd4ee5a3d2c118509c
-
SHA1
5ed6079331bd5f5aee9c76c24b2c4e1719e122e8
-
SHA256
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed
-
SHA512
ecb7254bb4c5b1d8dd4d39383deff6b7a3063a135b58e1847e73d5486e493ceb2525adc7144265c6d501af6134e133cb0cb114614025210558609eaff0fdd58c
-
SSDEEP
12288:fMrwy90Zp2RwWMcXC7TQfVNI+5MADdvPp9vNYVm3/:TyjBMq50+5MAF7vO83/
Static task
static1
Behavioral task
behavioral1
Sample
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed
-
Size
526KB
-
MD5
b1d8c55cdb5168fd4ee5a3d2c118509c
-
SHA1
5ed6079331bd5f5aee9c76c24b2c4e1719e122e8
-
SHA256
d8d5567987cd6edabb0793079623324a2c661942c4f5575cc7a07f337e5296ed
-
SHA512
ecb7254bb4c5b1d8dd4d39383deff6b7a3063a135b58e1847e73d5486e493ceb2525adc7144265c6d501af6134e133cb0cb114614025210558609eaff0fdd58c
-
SSDEEP
12288:fMrwy90Zp2RwWMcXC7TQfVNI+5MADdvPp9vNYVm3/:TyjBMq50+5MAF7vO83/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-