General
-
Target
d978104b34f9c407cd0a48b0c3a7b7cb.exe
-
Size
561KB
-
Sample
230306-mdnnasbg43
-
MD5
d978104b34f9c407cd0a48b0c3a7b7cb
-
SHA1
e14d8f7d2f7d455fee751a6b6d2d53f188cc5473
-
SHA256
9e9ff5827f90993bf7e9a8bd7f1b9f064180bff8211ca87d8e1d5886c11d5508
-
SHA512
0af321c5f5dd83ee9950c51ff691b35f79eda8a8484d3c99d0ba59babefc370d3238d5671c660a526446b78c4bfd50455f31325ece591f6e7996931b6afc725d
-
SSDEEP
12288:ZMrly902p3vfB5VK1Yz/Q9DOFWVGKT/V4VUELZEWoxO:Qy/3TVeYz/kDOFWn4XLZEWoxO
Static task
static1
Behavioral task
behavioral1
Sample
d978104b34f9c407cd0a48b0c3a7b7cb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d978104b34f9c407cd0a48b0c3a7b7cb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
d978104b34f9c407cd0a48b0c3a7b7cb.exe
-
Size
561KB
-
MD5
d978104b34f9c407cd0a48b0c3a7b7cb
-
SHA1
e14d8f7d2f7d455fee751a6b6d2d53f188cc5473
-
SHA256
9e9ff5827f90993bf7e9a8bd7f1b9f064180bff8211ca87d8e1d5886c11d5508
-
SHA512
0af321c5f5dd83ee9950c51ff691b35f79eda8a8484d3c99d0ba59babefc370d3238d5671c660a526446b78c4bfd50455f31325ece591f6e7996931b6afc725d
-
SSDEEP
12288:ZMrly902p3vfB5VK1Yz/Q9DOFWVGKT/V4VUELZEWoxO:Qy/3TVeYz/kDOFWn4XLZEWoxO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-