General
-
Target
26fe7a088a62f1844bc514533a13becc.exe
-
Size
549KB
-
Sample
230310-h9jl1adg9z
-
MD5
26fe7a088a62f1844bc514533a13becc
-
SHA1
692aec8bc96bb013eb3cc18415bfbee5d5225e59
-
SHA256
718eb1a15f1b7aa9d13d1beb659c5205502fa8b150be3c87406e1083c1821afb
-
SHA512
feb78e821d358575c5f35b4d02ce98832e827a868a371a7bdf4d188f3b47b4675a8d27b8c9835a74944db768162290e7cc1fa73985b9b7ef49b1857fcaa949ec
-
SSDEEP
12288:eMrby905t2QPlc4X5zPKB+sQqzQx0esPIkZhUQ:xyEHa8rKB+DBumQ
Static task
static1
Behavioral task
behavioral1
Sample
26fe7a088a62f1844bc514533a13becc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
26fe7a088a62f1844bc514533a13becc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Targets
-
-
Target
26fe7a088a62f1844bc514533a13becc.exe
-
Size
549KB
-
MD5
26fe7a088a62f1844bc514533a13becc
-
SHA1
692aec8bc96bb013eb3cc18415bfbee5d5225e59
-
SHA256
718eb1a15f1b7aa9d13d1beb659c5205502fa8b150be3c87406e1083c1821afb
-
SHA512
feb78e821d358575c5f35b4d02ce98832e827a868a371a7bdf4d188f3b47b4675a8d27b8c9835a74944db768162290e7cc1fa73985b9b7ef49b1857fcaa949ec
-
SSDEEP
12288:eMrby905t2QPlc4X5zPKB+sQqzQx0esPIkZhUQ:xyEHa8rKB+DBumQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-