General
-
Target
363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011
-
Size
550KB
-
Sample
230308-db677adf82
-
MD5
a341aea8664f3be9a7b53accef0e6d51
-
SHA1
346e5f32cb27df60ae2eff124024d293c9208a74
-
SHA256
363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011
-
SHA512
a46af431a64dc5d0e65c0c31eb54c8080196d23b483ecbc719a42d02f87aa143a4dec68dd309c1873ca50f0a75bf94be79d8ef2fd92ca626c7d25973eea0470e
-
SSDEEP
12288:pMrKy90Hahimz7AuxqVlVWvo6dfmG85DXHhzjGJ:3yOsVAuxYj+6DlK
Static task
static1
Behavioral task
behavioral1
Sample
363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011
-
Size
550KB
-
MD5
a341aea8664f3be9a7b53accef0e6d51
-
SHA1
346e5f32cb27df60ae2eff124024d293c9208a74
-
SHA256
363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011
-
SHA512
a46af431a64dc5d0e65c0c31eb54c8080196d23b483ecbc719a42d02f87aa143a4dec68dd309c1873ca50f0a75bf94be79d8ef2fd92ca626c7d25973eea0470e
-
SSDEEP
12288:pMrKy90Hahimz7AuxqVlVWvo6dfmG85DXHhzjGJ:3yOsVAuxYj+6DlK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-