General
-
Target
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6
-
Size
526KB
-
Sample
230305-w5bx9age9v
-
MD5
d80e1e1a576533180129bd59e70f2471
-
SHA1
23251426fd645179243ac669b8cc5f48e262f118
-
SHA256
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6
-
SHA512
ecb1d70fe2cba143c9c459c9bbc80175c08454ecc0d887bdd4c9b57e1ea320ae032a16c810d58350be2d683cdcc04387ff21a3fe9f162a7959949e2eefd97441
-
SSDEEP
12288:CMrly901bFVqxeS0MwO6pAbAoyuEs1pZedXwD0O:/yuLAP6p8dysmhg
Static task
static1
Behavioral task
behavioral1
Sample
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6
-
Size
526KB
-
MD5
d80e1e1a576533180129bd59e70f2471
-
SHA1
23251426fd645179243ac669b8cc5f48e262f118
-
SHA256
fe5348b60b72e690ed17cf8131556abbd4ee147b41d300b997b75635f6ce04d6
-
SHA512
ecb1d70fe2cba143c9c459c9bbc80175c08454ecc0d887bdd4c9b57e1ea320ae032a16c810d58350be2d683cdcc04387ff21a3fe9f162a7959949e2eefd97441
-
SSDEEP
12288:CMrly901bFVqxeS0MwO6pAbAoyuEs1pZedXwD0O:/yuLAP6p8dysmhg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-