General
-
Target
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c
-
Size
525KB
-
Sample
230305-3gkntahc71
-
MD5
00b83de606305ac4700ac5bbeecffaa3
-
SHA1
fd170aa760b3bbf39145948230a1a25d0476e849
-
SHA256
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c
-
SHA512
a5a2bff1275488ee1ca484d8cbc52e35a7a14d665746298a563a8bb5611f5315586b2667faa714b1990c275309ae8f5916521152245944859e68044134a689b5
-
SSDEEP
12288:LMruy90UTqH3uKmYMezEVclcYPCZjebAQXa5Li9PE9:ly9eH3uK/UVV8bQui
Static task
static1
Behavioral task
behavioral1
Sample
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c
-
Size
525KB
-
MD5
00b83de606305ac4700ac5bbeecffaa3
-
SHA1
fd170aa760b3bbf39145948230a1a25d0476e849
-
SHA256
6f7fdd15537f8cb5f6d4a30070aa121a1a4933c8eea72ef460dd23a56199e60c
-
SHA512
a5a2bff1275488ee1ca484d8cbc52e35a7a14d665746298a563a8bb5611f5315586b2667faa714b1990c275309ae8f5916521152245944859e68044134a689b5
-
SSDEEP
12288:LMruy90UTqH3uKmYMezEVclcYPCZjebAQXa5Li9PE9:ly9eH3uK/UVV8bQui
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-