General
-
Target
319ec5b87259220b53556bb1473549e63112a7cc837cb47bb5fe54b92e18e3db
-
Size
561KB
-
Sample
230306-vnj2vsch5y
-
MD5
2bf6a95a53e8d87b88e41c3315c566f0
-
SHA1
9d36fac8eb53f94a2faef399950431b96fa56044
-
SHA256
319ec5b87259220b53556bb1473549e63112a7cc837cb47bb5fe54b92e18e3db
-
SHA512
f9bdca368f0ca30af0bb94b8e5cf5502eece84b76d87e7db6dacf2f02ea5abaa4961e848d71e3ce43c698594ff65d75ffd2caeb6fb9daaa7c9a9a5cfbc9cf37c
-
SSDEEP
12288:oMryy90IfuLU4slTWJ10bAci/VS3Ow944/O2J:qyzX47cq2zK4PJ
Static task
static1
Behavioral task
behavioral1
Sample
319ec5b87259220b53556bb1473549e63112a7cc837cb47bb5fe54b92e18e3db.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Targets
-
-
Target
319ec5b87259220b53556bb1473549e63112a7cc837cb47bb5fe54b92e18e3db
-
Size
561KB
-
MD5
2bf6a95a53e8d87b88e41c3315c566f0
-
SHA1
9d36fac8eb53f94a2faef399950431b96fa56044
-
SHA256
319ec5b87259220b53556bb1473549e63112a7cc837cb47bb5fe54b92e18e3db
-
SHA512
f9bdca368f0ca30af0bb94b8e5cf5502eece84b76d87e7db6dacf2f02ea5abaa4961e848d71e3ce43c698594ff65d75ffd2caeb6fb9daaa7c9a9a5cfbc9cf37c
-
SSDEEP
12288:oMryy90IfuLU4slTWJ10bAci/VS3Ow944/O2J:qyzX47cq2zK4PJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-