General
-
Target
c68f229872ee62bab2bd1e2cf7ae2b17338f075b1657460f45bcf79af3675ad9
-
Size
529KB
-
Sample
230305-vtf76agd5z
-
MD5
de7a0659c913afdf8ed98b7379b1022b
-
SHA1
2734ef012d9acb6e82632e2b0d0ca291ae5512b8
-
SHA256
c68f229872ee62bab2bd1e2cf7ae2b17338f075b1657460f45bcf79af3675ad9
-
SHA512
e0ada76df31cc9e4f4e2d5c121c9637645a45e9fcc21dc2649f973f58ea571bed35d0d096e0c2c3d962a11f47ce34d14f2000f62683cefe786fae03d70bed2c9
-
SSDEEP
12288:QMrwy90DE9hcV+fsjOJZrRLXG7ro+nZDjwq2KjxrtWZz:wyqE9CVpOJZrRDGo+ntwsxg5
Static task
static1
Behavioral task
behavioral1
Sample
c68f229872ee62bab2bd1e2cf7ae2b17338f075b1657460f45bcf79af3675ad9.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
c68f229872ee62bab2bd1e2cf7ae2b17338f075b1657460f45bcf79af3675ad9
-
Size
529KB
-
MD5
de7a0659c913afdf8ed98b7379b1022b
-
SHA1
2734ef012d9acb6e82632e2b0d0ca291ae5512b8
-
SHA256
c68f229872ee62bab2bd1e2cf7ae2b17338f075b1657460f45bcf79af3675ad9
-
SHA512
e0ada76df31cc9e4f4e2d5c121c9637645a45e9fcc21dc2649f973f58ea571bed35d0d096e0c2c3d962a11f47ce34d14f2000f62683cefe786fae03d70bed2c9
-
SSDEEP
12288:QMrwy90DE9hcV+fsjOJZrRLXG7ro+nZDjwq2KjxrtWZz:wyqE9CVpOJZrRDGo+ntwsxg5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-