General
-
Target
d7753dbd68c01dd519120184c132316b81325b6370dcf1a1b6816aa5e715dabc
-
Size
559KB
-
Sample
230307-27hrgacf97
-
MD5
2f00ea6c928fa69465d5edf9c1db0328
-
SHA1
638f59e805d6eff57f5f31930998c902ee1e90b7
-
SHA256
d7753dbd68c01dd519120184c132316b81325b6370dcf1a1b6816aa5e715dabc
-
SHA512
9a56f920fb285bde8cbffe32b06a65a7ca8a2c51e8ad42356a00e830e69132cc32737d1f9f9f07f097af68393b6e2abaef52c22cc88b26600c2b93e04ea93100
-
SSDEEP
12288:VMrny90Np2LLPID6yb3LTHX/jzNModRIV7u+g/nIkFS:KygeLPJyb3PHv9Nd+7uznIOS
Static task
static1
Behavioral task
behavioral1
Sample
d7753dbd68c01dd519120184c132316b81325b6370dcf1a1b6816aa5e715dabc.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Targets
-
-
Target
d7753dbd68c01dd519120184c132316b81325b6370dcf1a1b6816aa5e715dabc
-
Size
559KB
-
MD5
2f00ea6c928fa69465d5edf9c1db0328
-
SHA1
638f59e805d6eff57f5f31930998c902ee1e90b7
-
SHA256
d7753dbd68c01dd519120184c132316b81325b6370dcf1a1b6816aa5e715dabc
-
SHA512
9a56f920fb285bde8cbffe32b06a65a7ca8a2c51e8ad42356a00e830e69132cc32737d1f9f9f07f097af68393b6e2abaef52c22cc88b26600c2b93e04ea93100
-
SSDEEP
12288:VMrny90Np2LLPID6yb3LTHX/jzNModRIV7u+g/nIkFS:KygeLPJyb3PHv9Nd+7uznIOS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-