General
-
Target
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f
-
Size
569KB
-
Sample
230309-hcpfzshg9z
-
MD5
38e20f8fb651a1a5a55d235c8960cdfc
-
SHA1
cc907f508e48fb3298e89a95faadf431983d408e
-
SHA256
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f
-
SHA512
6e9659da3febffbf63ac4bdc6d6f025681b3f9cd2f26450cbf015149c3e53dcc9ef5ed0dadfa6a4af3e22eb57666ebcb5339ea66222f5eb690cba2a244b13290
-
SSDEEP
12288:0Mrjy90Wahimz7AuxqVd4K4Zu5gTDEgV9W0dGZRgN:3yHsVAuxYdzUuSDV9W0dGZR0
Static task
static1
Behavioral task
behavioral1
Sample
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f
-
Size
569KB
-
MD5
38e20f8fb651a1a5a55d235c8960cdfc
-
SHA1
cc907f508e48fb3298e89a95faadf431983d408e
-
SHA256
607052c4a625ed1dbb1d76c536d01b4df2bfdbc13a230c60497b537ef92add3f
-
SHA512
6e9659da3febffbf63ac4bdc6d6f025681b3f9cd2f26450cbf015149c3e53dcc9ef5ed0dadfa6a4af3e22eb57666ebcb5339ea66222f5eb690cba2a244b13290
-
SSDEEP
12288:0Mrjy90Wahimz7AuxqVd4K4Zu5gTDEgV9W0dGZRgN:3yHsVAuxYdzUuSDV9W0dGZR0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-