General
-
Target
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9
-
Size
561KB
-
Sample
230306-sxrryscd9x
-
MD5
a914ba69b31d026f95b8bbc7979e9192
-
SHA1
b15ffd47edd1ab0a50f7864f59ce39d0f7b5cf1a
-
SHA256
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9
-
SHA512
e81c2cf37bbf9b6dee0c872f4aa0a85fdcd03071175554e983c59fd92176ffbf9ac67d3f5dcb9d440068895fd46256c09538ec939363736d189eaa66e22818ca
-
SSDEEP
12288:sMr6y90yrie/ODYUlKxaPLLwRrxI0Vb+Udf:Wy1rRrUcaPwFu0iUdf
Static task
static1
Behavioral task
behavioral1
Sample
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9
-
Size
561KB
-
MD5
a914ba69b31d026f95b8bbc7979e9192
-
SHA1
b15ffd47edd1ab0a50f7864f59ce39d0f7b5cf1a
-
SHA256
72f340a036eb778b8e1e147d149b2877dcc15a6dbab538c12699437ecad4f2f9
-
SHA512
e81c2cf37bbf9b6dee0c872f4aa0a85fdcd03071175554e983c59fd92176ffbf9ac67d3f5dcb9d440068895fd46256c09538ec939363736d189eaa66e22818ca
-
SSDEEP
12288:sMr6y90yrie/ODYUlKxaPLLwRrxI0Vb+Udf:Wy1rRrUcaPwFu0iUdf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-