General
-
Target
1baa96e634e34da54f19bb0f2d0aa7dec44b80619747753e1fea3b20d1521042
-
Size
526KB
-
Sample
230306-a1p4eshd8w
-
MD5
07537850fa9902edcfa2bc0d980b92da
-
SHA1
848ef993eafe6734b8c6ce851d2ed4625a0e7c2c
-
SHA256
1baa96e634e34da54f19bb0f2d0aa7dec44b80619747753e1fea3b20d1521042
-
SHA512
963462dc4ac1710abb7aaab898518e465a7dabed5cf7d76a756c97e51b940b1d68e59abdb5248cc9555ada084d6e766bae2cb2c659220d831d5107e4fbe7447f
-
SSDEEP
12288:9Mr3y90TZpLTIt4rEsREKkaAcolAzGAHgVyO+xDtJtQJg0Mu4:ayUZhfrEsVZzGAm+xDrtQB4
Static task
static1
Behavioral task
behavioral1
Sample
1baa96e634e34da54f19bb0f2d0aa7dec44b80619747753e1fea3b20d1521042.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
1baa96e634e34da54f19bb0f2d0aa7dec44b80619747753e1fea3b20d1521042
-
Size
526KB
-
MD5
07537850fa9902edcfa2bc0d980b92da
-
SHA1
848ef993eafe6734b8c6ce851d2ed4625a0e7c2c
-
SHA256
1baa96e634e34da54f19bb0f2d0aa7dec44b80619747753e1fea3b20d1521042
-
SHA512
963462dc4ac1710abb7aaab898518e465a7dabed5cf7d76a756c97e51b940b1d68e59abdb5248cc9555ada084d6e766bae2cb2c659220d831d5107e4fbe7447f
-
SSDEEP
12288:9Mr3y90TZpLTIt4rEsREKkaAcolAzGAHgVyO+xDtJtQJg0Mu4:ayUZhfrEsVZzGAm+xDrtQB4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-