General
-
Target
24e8a7d8d2f06e6b5215fa7c473ff2cbeab8160b7d3c8bc1aab614c5271432fe
-
Size
531KB
-
Sample
230305-gzkwmsfh46
-
MD5
e7fd5a0547cf31d5ccec88cff7a13e13
-
SHA1
82a861ae626ce02ea99bbdabf8c6fe4940d16999
-
SHA256
24e8a7d8d2f06e6b5215fa7c473ff2cbeab8160b7d3c8bc1aab614c5271432fe
-
SHA512
09f77c9ff6c55ad83fb81493bf2eb8344766b8b58784b17045eb2bbba5073a8f9a85221cbf35aa3fe7a8fd18943f76ebdbb356852ff513be8724394fad9b908c
-
SSDEEP
12288:NMrgy90s/LVKOtMT312Nnxo81tEAOZdIjOObO:ZydVTaTlMqEtTOTIaqO
Static task
static1
Behavioral task
behavioral1
Sample
24e8a7d8d2f06e6b5215fa7c473ff2cbeab8160b7d3c8bc1aab614c5271432fe.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rulit
pedigj.eu:4162
-
auth_value
f4df9ef56871d4ac883b282abaf635e0
Extracted
redline
filon
193.233.20.24:4123
-
auth_value
f561e6a71c36ff1cef8c9bea12ae5256
Targets
-
-
Target
24e8a7d8d2f06e6b5215fa7c473ff2cbeab8160b7d3c8bc1aab614c5271432fe
-
Size
531KB
-
MD5
e7fd5a0547cf31d5ccec88cff7a13e13
-
SHA1
82a861ae626ce02ea99bbdabf8c6fe4940d16999
-
SHA256
24e8a7d8d2f06e6b5215fa7c473ff2cbeab8160b7d3c8bc1aab614c5271432fe
-
SHA512
09f77c9ff6c55ad83fb81493bf2eb8344766b8b58784b17045eb2bbba5073a8f9a85221cbf35aa3fe7a8fd18943f76ebdbb356852ff513be8724394fad9b908c
-
SSDEEP
12288:NMrgy90s/LVKOtMT312Nnxo81tEAOZdIjOObO:ZydVTaTlMqEtTOTIaqO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-