General
-
Target
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc
-
Size
526KB
-
Sample
230305-ywmphagg6y
-
MD5
b38f27187d029c14531b21f62125d8ab
-
SHA1
2ad04c23698460fa4b2e3dcc103e5f7eb025c65d
-
SHA256
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc
-
SHA512
e43c83eb0b30741b5d1e1c096c2c62cbf1f866638d5784b96f508734a8466d7ff7d3d27d847ac0642a051d96ec37fe3ced13ccc64b4fe0e8da336ac670e10a17
-
SSDEEP
12288:dMrty90EMm26Pl3ly4KnQTpXOruCR1NKknfd68t7THWAXR:4yhMk9wpnQVerFNRl6oWaR
Static task
static1
Behavioral task
behavioral1
Sample
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc
-
Size
526KB
-
MD5
b38f27187d029c14531b21f62125d8ab
-
SHA1
2ad04c23698460fa4b2e3dcc103e5f7eb025c65d
-
SHA256
9d0d12052e946abb14f33e9e8ff829d3bf9ec9a7dd81b8642cd125c546176cbc
-
SHA512
e43c83eb0b30741b5d1e1c096c2c62cbf1f866638d5784b96f508734a8466d7ff7d3d27d847ac0642a051d96ec37fe3ced13ccc64b4fe0e8da336ac670e10a17
-
SSDEEP
12288:dMrty90EMm26Pl3ly4KnQTpXOruCR1NKknfd68t7THWAXR:4yhMk9wpnQVerFNRl6oWaR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-