General
-
Target
7d9c8351aaac93a360d70829e9d7200326be20f0f3a96284b218d627f7077004
-
Size
526KB
-
Sample
230305-y8awgagg8x
-
MD5
122775501867696fa4523c46f9544966
-
SHA1
3608960a58e7f9b421bbb2e0f88c7219a93ce854
-
SHA256
7d9c8351aaac93a360d70829e9d7200326be20f0f3a96284b218d627f7077004
-
SHA512
9cc5fedc2b62ebc60500d515c13ac4910e6ba65940d4ef7dd83502809964ef45f5ad4b28cfde3765310845d593debb33dc0300dc7381a735adfb367f7bd5d5fe
-
SSDEEP
12288:XMrjy90ISTsQfLfj/wXFle8u1a1C6hauh:IylSYQfLbI1A89Fn
Static task
static1
Behavioral task
behavioral1
Sample
7d9c8351aaac93a360d70829e9d7200326be20f0f3a96284b218d627f7077004.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
7d9c8351aaac93a360d70829e9d7200326be20f0f3a96284b218d627f7077004
-
Size
526KB
-
MD5
122775501867696fa4523c46f9544966
-
SHA1
3608960a58e7f9b421bbb2e0f88c7219a93ce854
-
SHA256
7d9c8351aaac93a360d70829e9d7200326be20f0f3a96284b218d627f7077004
-
SHA512
9cc5fedc2b62ebc60500d515c13ac4910e6ba65940d4ef7dd83502809964ef45f5ad4b28cfde3765310845d593debb33dc0300dc7381a735adfb367f7bd5d5fe
-
SSDEEP
12288:XMrjy90ISTsQfLfj/wXFle8u1a1C6hauh:IylSYQfLbI1A89Fn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-