General
-
Target
c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a
-
Size
393KB
-
Sample
230309-fh6w4she8s
-
MD5
8768f619733cf8bddf11505e98672b26
-
SHA1
c05720edd1a1e967113724ed5adc7c26694c9ac8
-
SHA256
c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a
-
SHA512
c470aa32f12073271b5f5e702b5ebb4327a84302c4f7f6ea0c75e2ae97d04fc888e387ff0cf47401b4fdad63de01ca12ca4a93e27144b9ce87d5e670d368ec94
-
SSDEEP
6144:KNy+bnr+Up0yN90QEKuwQDQix1bE4t5B9uo2D8hiu6B4v6uO02i5E:LMrky904QUiTEa9uuV6BcSCE
Static task
static1
Behavioral task
behavioral1
Sample
c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a
-
Size
393KB
-
MD5
8768f619733cf8bddf11505e98672b26
-
SHA1
c05720edd1a1e967113724ed5adc7c26694c9ac8
-
SHA256
c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a
-
SHA512
c470aa32f12073271b5f5e702b5ebb4327a84302c4f7f6ea0c75e2ae97d04fc888e387ff0cf47401b4fdad63de01ca12ca4a93e27144b9ce87d5e670d368ec94
-
SSDEEP
6144:KNy+bnr+Up0yN90QEKuwQDQix1bE4t5B9uo2D8hiu6B4v6uO02i5E:LMrky904QUiTEa9uuV6BcSCE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-