General
-
Target
bdcb28b0683c150177d5e22ae2962fd424db663197e37bfffe728cf113a7ca38
-
Size
569KB
-
Sample
230308-2bed6shd86
-
MD5
3d7716d0b86dd2d9716bf69b4cbfdd03
-
SHA1
28d2f754f43759157cc47788a5919a93fcf2c7e2
-
SHA256
bdcb28b0683c150177d5e22ae2962fd424db663197e37bfffe728cf113a7ca38
-
SHA512
170f062da12ef6725b4bfdb19008d5546ff3a4e3ab418c4d72eee7fb57e4ee49594d8c969c9e13449b3765bf4f9f7bbc30421215137d590b422ebabd57ced43b
-
SSDEEP
12288:aMr0y90Uahimz7AuxqVrhAfM7hjpKewASe4Ts3Q:WydsVAuxY1T738pl
Static task
static1
Behavioral task
behavioral1
Sample
bdcb28b0683c150177d5e22ae2962fd424db663197e37bfffe728cf113a7ca38.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
bdcb28b0683c150177d5e22ae2962fd424db663197e37bfffe728cf113a7ca38
-
Size
569KB
-
MD5
3d7716d0b86dd2d9716bf69b4cbfdd03
-
SHA1
28d2f754f43759157cc47788a5919a93fcf2c7e2
-
SHA256
bdcb28b0683c150177d5e22ae2962fd424db663197e37bfffe728cf113a7ca38
-
SHA512
170f062da12ef6725b4bfdb19008d5546ff3a4e3ab418c4d72eee7fb57e4ee49594d8c969c9e13449b3765bf4f9f7bbc30421215137d590b422ebabd57ced43b
-
SSDEEP
12288:aMr0y90Uahimz7AuxqVrhAfM7hjpKewASe4Ts3Q:WydsVAuxY1T738pl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-