General
-
Target
eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775
-
Size
385KB
-
Sample
230308-yh2lhagf95
-
MD5
c0e7c9c5f2bdf0436012d5ccc08a6205
-
SHA1
d0cb361f24f36ed76ae230705db9e558ae9fbad2
-
SHA256
eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775
-
SHA512
e072892fc730f5bd739f8edd7d473f967ff50be735a1a82687ffe18ed826021ce3cfb01f3c01370549e343917ec6e497946f34aa1b578bd8bb6dc4738582b4a3
-
SSDEEP
6144:KBy+bnr+kp0yN90QEv0WYkC96cgODh8h1CPLnzqRB+eBbj19zPhJEAOZXqWpUipw:PMrMy90k9zn0o78HzbEAIXMWuL
Static task
static1
Behavioral task
behavioral1
Sample
eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775
-
Size
385KB
-
MD5
c0e7c9c5f2bdf0436012d5ccc08a6205
-
SHA1
d0cb361f24f36ed76ae230705db9e558ae9fbad2
-
SHA256
eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775
-
SHA512
e072892fc730f5bd739f8edd7d473f967ff50be735a1a82687ffe18ed826021ce3cfb01f3c01370549e343917ec6e497946f34aa1b578bd8bb6dc4738582b4a3
-
SSDEEP
6144:KBy+bnr+kp0yN90QEv0WYkC96cgODh8h1CPLnzqRB+eBbj19zPhJEAOZXqWpUipw:PMrMy90k9zn0o78HzbEAIXMWuL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-