General
-
Target
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf
-
Size
526KB
-
Sample
230306-cyynwsac75
-
MD5
9692007af8be6fd3bc5c72c1e9da34c9
-
SHA1
8dee89f4afdf5681fb57243ec1a6a0c5bf392c21
-
SHA256
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf
-
SHA512
bf2f23791e60beaae89c43d45f1befa3729ac285cd3f29b621399287d75be9c27ab1eeb1a170741c2b63fddfa632a287682d1a0223ea29707a521a8f72056e39
-
SSDEEP
12288:eMrQy90j8Kw23FvvD7rkm+3lVV9FRZPARq7fyT:Oy4xvDOJRZPAFT
Static task
static1
Behavioral task
behavioral1
Sample
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf
-
Size
526KB
-
MD5
9692007af8be6fd3bc5c72c1e9da34c9
-
SHA1
8dee89f4afdf5681fb57243ec1a6a0c5bf392c21
-
SHA256
5190a86e760ae3c1eb27ef5ee753eff002a3cccdcb74f3b64b1568ef0bc8c7cf
-
SHA512
bf2f23791e60beaae89c43d45f1befa3729ac285cd3f29b621399287d75be9c27ab1eeb1a170741c2b63fddfa632a287682d1a0223ea29707a521a8f72056e39
-
SSDEEP
12288:eMrQy90j8Kw23FvvD7rkm+3lVV9FRZPARq7fyT:Oy4xvDOJRZPAFT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-