General
-
Target
610c02ff2f26ccdfd47439998f3096c4f99d34f0fe895bae40dcdd4f5830a603
-
Size
561KB
-
Sample
230306-tletpacf4v
-
MD5
c2d9488c8bd2611ad6fa555c2efb8efd
-
SHA1
6fb935de0cd1aa6839ca59b404689c9e672979c1
-
SHA256
610c02ff2f26ccdfd47439998f3096c4f99d34f0fe895bae40dcdd4f5830a603
-
SHA512
e65d793f53b5c236027a688b1d65b52b5af6c1f02ad3f1c5aded0e2998d4710366aef61ee14f373ae18fedc4b67d9aca00a23b2827af94054e4a9caab2739463
-
SSDEEP
12288:dMrWy90imShKXx23SP+sifVeVa9Vhtec7tGnPOc:7yd1sB234217P7tGPOc
Static task
static1
Behavioral task
behavioral1
Sample
610c02ff2f26ccdfd47439998f3096c4f99d34f0fe895bae40dcdd4f5830a603.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
610c02ff2f26ccdfd47439998f3096c4f99d34f0fe895bae40dcdd4f5830a603
-
Size
561KB
-
MD5
c2d9488c8bd2611ad6fa555c2efb8efd
-
SHA1
6fb935de0cd1aa6839ca59b404689c9e672979c1
-
SHA256
610c02ff2f26ccdfd47439998f3096c4f99d34f0fe895bae40dcdd4f5830a603
-
SHA512
e65d793f53b5c236027a688b1d65b52b5af6c1f02ad3f1c5aded0e2998d4710366aef61ee14f373ae18fedc4b67d9aca00a23b2827af94054e4a9caab2739463
-
SSDEEP
12288:dMrWy90imShKXx23SP+sifVeVa9Vhtec7tGnPOc:7yd1sB234217P7tGPOc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-