General
-
Target
387e43003d1451875f25c4ca6ea1ffdb6528f4879955b4c80397c3852dd3f2ca
-
Size
556KB
-
Sample
230306-gg6emaad4w
-
MD5
031c82085ad908ae71be826a907550d6
-
SHA1
8a7b23243de353b2ce6bcc59a11fa2dc4d3a0856
-
SHA256
387e43003d1451875f25c4ca6ea1ffdb6528f4879955b4c80397c3852dd3f2ca
-
SHA512
7a4cdcf805c6687368a7da2c1806d7712280f374f5ec9270d1a5b66888af95f6cfcc9b9223d1b1880ce26ff8629f0524bc6e64cc454e093be13444c1027feb51
-
SSDEEP
12288:TMrxy90MkwKw9um9PNaZFDMhxwgi2RGJiyOtNOezR:WyzGwcZCLisGJiy2MuR
Static task
static1
Behavioral task
behavioral1
Sample
387e43003d1451875f25c4ca6ea1ffdb6528f4879955b4c80397c3852dd3f2ca.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
387e43003d1451875f25c4ca6ea1ffdb6528f4879955b4c80397c3852dd3f2ca
-
Size
556KB
-
MD5
031c82085ad908ae71be826a907550d6
-
SHA1
8a7b23243de353b2ce6bcc59a11fa2dc4d3a0856
-
SHA256
387e43003d1451875f25c4ca6ea1ffdb6528f4879955b4c80397c3852dd3f2ca
-
SHA512
7a4cdcf805c6687368a7da2c1806d7712280f374f5ec9270d1a5b66888af95f6cfcc9b9223d1b1880ce26ff8629f0524bc6e64cc454e093be13444c1027feb51
-
SSDEEP
12288:TMrxy90MkwKw9um9PNaZFDMhxwgi2RGJiyOtNOezR:WyzGwcZCLisGJiy2MuR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-