General
-
Target
98e52f3edc6fc7f71db196fba7a71ce4f11a571acb177f4f128c3dfad208d5d2
-
Size
557KB
-
Sample
230306-gznbrsad7w
-
MD5
b51f32d37bdf10b29a5493a4e0228e02
-
SHA1
d7c65739da45679ce4d301204919cd8b0d19aa63
-
SHA256
98e52f3edc6fc7f71db196fba7a71ce4f11a571acb177f4f128c3dfad208d5d2
-
SHA512
e8e6ce064eb6c5da3e746d52f9851053fb86cb58575bf9d9cfbf23cfa37e43f65144cac49f04fe6caae43d63ad9be9665e5c44a48df72d7710e369a644cedb51
-
SSDEEP
12288:9Mrny90uj72P5q94Npapf0t/GoG23UYokwLcP5:Ky2P5q94NclkGoGsUYokv
Static task
static1
Behavioral task
behavioral1
Sample
98e52f3edc6fc7f71db196fba7a71ce4f11a571acb177f4f128c3dfad208d5d2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
98e52f3edc6fc7f71db196fba7a71ce4f11a571acb177f4f128c3dfad208d5d2
-
Size
557KB
-
MD5
b51f32d37bdf10b29a5493a4e0228e02
-
SHA1
d7c65739da45679ce4d301204919cd8b0d19aa63
-
SHA256
98e52f3edc6fc7f71db196fba7a71ce4f11a571acb177f4f128c3dfad208d5d2
-
SHA512
e8e6ce064eb6c5da3e746d52f9851053fb86cb58575bf9d9cfbf23cfa37e43f65144cac49f04fe6caae43d63ad9be9665e5c44a48df72d7710e369a644cedb51
-
SSDEEP
12288:9Mrny90uj72P5q94Npapf0t/GoG23UYokwLcP5:Ky2P5q94NclkGoGsUYokv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-