General
-
Target
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475
-
Size
530KB
-
Sample
230305-vjdpaagh34
-
MD5
eac8730d07e3c1ea76b788fd43c1f02f
-
SHA1
6d0d3f2f3e8b20a596c756b345c0aa9bd0403d8d
-
SHA256
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475
-
SHA512
57a340ffa4a58f3378583ea624abee8d23e9675c7e99b107211dd8a319613199b84c3ca5b71d484b13da9f261e3b732c7b403e95cc12c1d5036055674e3da5de
-
SSDEEP
12288:ZMrDy90RPoyVPjSMYN+jkXJWZ9DomoFNNeMRJ05iDdx/:6yUP7V1YNLXJk9om+7Ks
Static task
static1
Behavioral task
behavioral1
Sample
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475
-
Size
530KB
-
MD5
eac8730d07e3c1ea76b788fd43c1f02f
-
SHA1
6d0d3f2f3e8b20a596c756b345c0aa9bd0403d8d
-
SHA256
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475
-
SHA512
57a340ffa4a58f3378583ea624abee8d23e9675c7e99b107211dd8a319613199b84c3ca5b71d484b13da9f261e3b732c7b403e95cc12c1d5036055674e3da5de
-
SSDEEP
12288:ZMrDy90RPoyVPjSMYN+jkXJWZ9DomoFNNeMRJ05iDdx/:6yUP7V1YNLXJk9om+7Ks
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-