General
-
Target
cd1e0d4ae01fffbaf59dd97337130293.exe
-
Size
531KB
-
Sample
230305-f4vqzafg72
-
MD5
cd1e0d4ae01fffbaf59dd97337130293
-
SHA1
ea2d45052b72afb52d7a1c9f69cf6b1e180cd63c
-
SHA256
0747e227e1a6665c2b465a4756e1a58efde6cce11766f6c9671b881c24cbc035
-
SHA512
c4c591f0c9e4970a35395add4ce4babf9d561e3d4d938ccbf5ff89dd26f2f5cf37f06d6b36185e6ea1017e969b68c28348a9ec7c2c6d2e0f1399181c07591ff9
-
SSDEEP
12288:+MrSy90YN8vh+lTa3A41PefWG8YrxA7kRvu:MyQhQaw4QfW8y7J
Static task
static1
Behavioral task
behavioral1
Sample
cd1e0d4ae01fffbaf59dd97337130293.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd1e0d4ae01fffbaf59dd97337130293.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rulit
pedigj.eu:4162
-
auth_value
f4df9ef56871d4ac883b282abaf635e0
Extracted
redline
filon
193.233.20.24:4123
-
auth_value
f561e6a71c36ff1cef8c9bea12ae5256
Targets
-
-
Target
cd1e0d4ae01fffbaf59dd97337130293.exe
-
Size
531KB
-
MD5
cd1e0d4ae01fffbaf59dd97337130293
-
SHA1
ea2d45052b72afb52d7a1c9f69cf6b1e180cd63c
-
SHA256
0747e227e1a6665c2b465a4756e1a58efde6cce11766f6c9671b881c24cbc035
-
SHA512
c4c591f0c9e4970a35395add4ce4babf9d561e3d4d938ccbf5ff89dd26f2f5cf37f06d6b36185e6ea1017e969b68c28348a9ec7c2c6d2e0f1399181c07591ff9
-
SSDEEP
12288:+MrSy90YN8vh+lTa3A41PefWG8YrxA7kRvu:MyQhQaw4QfW8y7J
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-