General
-
Target
d1c43d5bd30e6dc8594f0decdbb2b9d4973e17cfe40441bad28bb387143d9e3a
-
Size
525KB
-
Sample
230305-3pc9pshd2t
-
MD5
58a74d2164423b10e0c7204986a77a85
-
SHA1
d59197eae9cf7f922c2159755efa13d0a5713f5c
-
SHA256
d1c43d5bd30e6dc8594f0decdbb2b9d4973e17cfe40441bad28bb387143d9e3a
-
SHA512
0234383fc4477bde6e57294b6f9109786d77464b304fe65648f0aa0dbb4564078cf388fa586b247f1130e2f5e63ebd37b75b5e41c54fe7878dfb2b75c08ad7f8
-
SSDEEP
12288:hMrky90cJOfxLVgFb1v5AFnFCcTjCFOkoebnMViW96:ZyxOfxRgTcn8uGn4w
Static task
static1
Behavioral task
behavioral1
Sample
d1c43d5bd30e6dc8594f0decdbb2b9d4973e17cfe40441bad28bb387143d9e3a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
d1c43d5bd30e6dc8594f0decdbb2b9d4973e17cfe40441bad28bb387143d9e3a
-
Size
525KB
-
MD5
58a74d2164423b10e0c7204986a77a85
-
SHA1
d59197eae9cf7f922c2159755efa13d0a5713f5c
-
SHA256
d1c43d5bd30e6dc8594f0decdbb2b9d4973e17cfe40441bad28bb387143d9e3a
-
SHA512
0234383fc4477bde6e57294b6f9109786d77464b304fe65648f0aa0dbb4564078cf388fa586b247f1130e2f5e63ebd37b75b5e41c54fe7878dfb2b75c08ad7f8
-
SSDEEP
12288:hMrky90cJOfxLVgFb1v5AFnFCcTjCFOkoebnMViW96:ZyxOfxRgTcn8uGn4w
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-