General
-
Target
3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d
-
Size
408KB
-
Sample
230308-esrz9sdh88
-
MD5
769b1a9a558cf8f2f26cc6539beeebe0
-
SHA1
536cc0733aeab78ae5fa181274df4442c1ef0996
-
SHA256
3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d
-
SHA512
4f1dd6cda2a4279d9f3af049d9985a99da22076c36e3ae3237c38d563f5b425ed0b4480a8533eaa10abe614b0c1a89f28622785707fc0c3a37478a75c801af8d
-
SSDEEP
6144:KYy+bnr+Np0yN90QEVZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF1w:MMrxy90jEY2tnfmzBb61qpIF1w
Static task
static1
Behavioral task
behavioral1
Sample
3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d
-
Size
408KB
-
MD5
769b1a9a558cf8f2f26cc6539beeebe0
-
SHA1
536cc0733aeab78ae5fa181274df4442c1ef0996
-
SHA256
3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d
-
SHA512
4f1dd6cda2a4279d9f3af049d9985a99da22076c36e3ae3237c38d563f5b425ed0b4480a8533eaa10abe614b0c1a89f28622785707fc0c3a37478a75c801af8d
-
SSDEEP
6144:KYy+bnr+Np0yN90QEVZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF1w:MMrxy90jEY2tnfmzBb61qpIF1w
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-