General
-
Target
fd9e9b2fbcaa00b69375f2e174e5be2de3b958e6222404b11311efabcaa378de
-
Size
386KB
-
Sample
230308-hrtn9aee34
-
MD5
9fe2051e727072527265fad476a1f04c
-
SHA1
567b62e701a17db4846298a2c2b1f4da2029b6c2
-
SHA256
fd9e9b2fbcaa00b69375f2e174e5be2de3b958e6222404b11311efabcaa378de
-
SHA512
4bd85c8e99b818fa413ddd7be54b7786669b4e063a049a2fa7ef9f0b80d05a9809265185eca69b9e6a2bf03d4fc6d1419493be60af3e8f1cc8115b4c96cbba0b
-
SSDEEP
6144:Kay+bnr+7p0yN90QEnCemQ4pGsl2aRpjf2nJV2h2/enwArs7V/Mpxgpxy9:aMrry90tCeruTir2hmfx/2Kpe
Static task
static1
Behavioral task
behavioral1
Sample
fd9e9b2fbcaa00b69375f2e174e5be2de3b958e6222404b11311efabcaa378de.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
fd9e9b2fbcaa00b69375f2e174e5be2de3b958e6222404b11311efabcaa378de
-
Size
386KB
-
MD5
9fe2051e727072527265fad476a1f04c
-
SHA1
567b62e701a17db4846298a2c2b1f4da2029b6c2
-
SHA256
fd9e9b2fbcaa00b69375f2e174e5be2de3b958e6222404b11311efabcaa378de
-
SHA512
4bd85c8e99b818fa413ddd7be54b7786669b4e063a049a2fa7ef9f0b80d05a9809265185eca69b9e6a2bf03d4fc6d1419493be60af3e8f1cc8115b4c96cbba0b
-
SSDEEP
6144:Kay+bnr+7p0yN90QEnCemQ4pGsl2aRpjf2nJV2h2/enwArs7V/Mpxgpxy9:aMrry90tCeruTir2hmfx/2Kpe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-