General
-
Target
e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718
-
Size
386KB
-
Sample
230308-mk2hqsfe78
-
MD5
d9960fef5486a7333f3b6feb3c7b226b
-
SHA1
29a0bc2f0109cfe285a39dc867ef95581bfa8112
-
SHA256
e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718
-
SHA512
a62313b3ae1a6f97c775b064b9516aa8f5433266ebbdc2c6da1f6a8e23c62c8382f1db9b9164b9261934ac0c398dc20bbcf7c3c7e1330ec1f6ec849a22d1a1ab
-
SSDEEP
6144:Kny+bnr+sp0yN90QEb8CQ/i6fmdza8YDH2D52nrpyjyU7x:1Mrwy90Z8nJmNa8IHxnFyyU7x
Static task
static1
Behavioral task
behavioral1
Sample
e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Targets
-
-
Target
e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718
-
Size
386KB
-
MD5
d9960fef5486a7333f3b6feb3c7b226b
-
SHA1
29a0bc2f0109cfe285a39dc867ef95581bfa8112
-
SHA256
e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718
-
SHA512
a62313b3ae1a6f97c775b064b9516aa8f5433266ebbdc2c6da1f6a8e23c62c8382f1db9b9164b9261934ac0c398dc20bbcf7c3c7e1330ec1f6ec849a22d1a1ab
-
SSDEEP
6144:Kny+bnr+sp0yN90QEb8CQ/i6fmdza8YDH2D52nrpyjyU7x:1Mrwy90Z8nJmNa8IHxnFyyU7x
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-