General
-
Target
3141d7440a8639b50a6d412e72142542.exe
-
Size
526KB
-
Sample
230306-fdy1psab7x
-
MD5
3141d7440a8639b50a6d412e72142542
-
SHA1
96c0de2895c0a42fd838a9d167cf26e63716b583
-
SHA256
0196d177ad5c0fa45978723063d3ad7ad06e4972986b32f7b4ef9b6ec27176a1
-
SHA512
127e42e0a6870f0d5449ba7361bba71a126c86cf35832bb9b5d7c282908f6775ac4936d987203dc36beecb469d5465c8895da533e1bf07c08f0d00494d72b48e
-
SSDEEP
6144:KNy+bnr+7p0yN90QEjIvVQbe/MsgDmj/Vtp+aLurj3eEhH+6Slkqh0ZyZOLI5Y:nMrTy90+vVQZKVtU1rbFhe6skOvZQEY
Static task
static1
Behavioral task
behavioral1
Sample
3141d7440a8639b50a6d412e72142542.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3141d7440a8639b50a6d412e72142542.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
3141d7440a8639b50a6d412e72142542.exe
-
Size
526KB
-
MD5
3141d7440a8639b50a6d412e72142542
-
SHA1
96c0de2895c0a42fd838a9d167cf26e63716b583
-
SHA256
0196d177ad5c0fa45978723063d3ad7ad06e4972986b32f7b4ef9b6ec27176a1
-
SHA512
127e42e0a6870f0d5449ba7361bba71a126c86cf35832bb9b5d7c282908f6775ac4936d987203dc36beecb469d5465c8895da533e1bf07c08f0d00494d72b48e
-
SSDEEP
6144:KNy+bnr+7p0yN90QEjIvVQbe/MsgDmj/Vtp+aLurj3eEhH+6Slkqh0ZyZOLI5Y:nMrTy90+vVQZKVtU1rbFhe6skOvZQEY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-