General
-
Target
655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094
-
Size
409KB
-
Sample
230309-hhb3vahh3z
-
MD5
b7bf63b17b25fe36d82f5bb3c5e8a207
-
SHA1
a8830fa940a17d3abc9f65f6dc2f6e0906574785
-
SHA256
655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094
-
SHA512
e7ade6e0634dfd72d2a14cdbef0dcf736f92fde1bf73a9a96c1e6c2b38aff098d2bf7c42e49d2bd1b43ce31dd5f868862fe581cfe0741e48db4e6a17794f5db2
-
SSDEEP
12288:TMrny90HrqT3SQsdygA3EgV9N0UGNag2ukGS:oysCsdmPV9N0UGNackGS
Static task
static1
Behavioral task
behavioral1
Sample
655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Targets
-
-
Target
655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094
-
Size
409KB
-
MD5
b7bf63b17b25fe36d82f5bb3c5e8a207
-
SHA1
a8830fa940a17d3abc9f65f6dc2f6e0906574785
-
SHA256
655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094
-
SHA512
e7ade6e0634dfd72d2a14cdbef0dcf736f92fde1bf73a9a96c1e6c2b38aff098d2bf7c42e49d2bd1b43ce31dd5f868862fe581cfe0741e48db4e6a17794f5db2
-
SSDEEP
12288:TMrny90HrqT3SQsdygA3EgV9N0UGNag2ukGS:oysCsdmPV9N0UGNackGS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-