General
-
Target
a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327
-
Size
408KB
-
Sample
230308-et8dmsdh94
-
MD5
7f4cbf987d61d686c7cf2d4149ad016f
-
SHA1
71891bd18ef0c50a69483ad43fa4583a77d90383
-
SHA256
a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327
-
SHA512
68f6d221172563e0510ca7fd0b93d1cb2f2b14fc9093399860437284ff25883d922b182f7287282a484641f315c086fac0ae796c7f1eba0996b07a981ea3f7e8
-
SSDEEP
6144:Kgy+bnr+dp0yN90QEKZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF15:EMr5y900EY2tnfmzBb61qpIF15
Static task
static1
Behavioral task
behavioral1
Sample
a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327
-
Size
408KB
-
MD5
7f4cbf987d61d686c7cf2d4149ad016f
-
SHA1
71891bd18ef0c50a69483ad43fa4583a77d90383
-
SHA256
a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327
-
SHA512
68f6d221172563e0510ca7fd0b93d1cb2f2b14fc9093399860437284ff25883d922b182f7287282a484641f315c086fac0ae796c7f1eba0996b07a981ea3f7e8
-
SSDEEP
6144:Kgy+bnr+dp0yN90QEKZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF15:EMr5y900EY2tnfmzBb61qpIF15
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-