General
-
Target
291421df6f7af2898e2ddeed7f67168d.exe
-
Size
560KB
-
Sample
230306-k8fvtsah5s
-
MD5
291421df6f7af2898e2ddeed7f67168d
-
SHA1
96d55b36bd7bd9501cf515039dae0d94bc843b73
-
SHA256
086fd8fce9dbe726874324817d9c43368ff6762451b59c7df59f48438242d226
-
SHA512
7c7b40be2348defe6abf89bbbb6c39c823f2f4791471f26d313d7e655773475a7d0c34a95beddaf1921af4c011dc18d4324b3a501d1ad84d484a0ec19b6a0d7c
-
SSDEEP
12288:lMrjy90TSDQKCL6Xo0UTWTwW3EdFTVGKT/+ujT8HN05VE5YKr:uyOIQKCHxTEwW3MFTAuv8XX
Static task
static1
Behavioral task
behavioral1
Sample
291421df6f7af2898e2ddeed7f67168d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
291421df6f7af2898e2ddeed7f67168d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
291421df6f7af2898e2ddeed7f67168d.exe
-
Size
560KB
-
MD5
291421df6f7af2898e2ddeed7f67168d
-
SHA1
96d55b36bd7bd9501cf515039dae0d94bc843b73
-
SHA256
086fd8fce9dbe726874324817d9c43368ff6762451b59c7df59f48438242d226
-
SHA512
7c7b40be2348defe6abf89bbbb6c39c823f2f4791471f26d313d7e655773475a7d0c34a95beddaf1921af4c011dc18d4324b3a501d1ad84d484a0ec19b6a0d7c
-
SSDEEP
12288:lMrjy90TSDQKCL6Xo0UTWTwW3EdFTVGKT/+ujT8HN05VE5YKr:uyOIQKCHxTEwW3MFTAuv8XX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-